Several errors, Thanks in advance

Joined
May 9, 2011
Messages
4
Reaction score
0
Hey, been getting several BSOD errors. Fairly randomly. Reformatted, changed video cards, nothing has greatly helped. Thanks in advance for your help.

The only think I know is that the last one was a 3B error, System service exception, dxgkrnl.sys

View attachment Crash Dumps 1.zip

mem tab.jpg

slot1.jpg

slot2.jpg

slot3.jpg

slot4.jpg
 
Joined
Sep 22, 2010
Messages
613
Reaction score
102
Hey, been getting several BSOD errors. Fairly randomly. Reformatted, changed video cards, nothing has greatly helped. Thanks in advance for your help.

Hey there, your RAM sticks are mismatched and that's why you are having blue screens.
WinDbg points to hardware (memory access violation):


040911-43531-01.dmp
BugCheck 50, {fffff89fc2f83fcf, 1, fffff88013d0a3ed, 5}
Could not read faulting driver name
Probably caused by : hardware ( dxgkrnl!DXGDEVICE::Unlock+2bd )

050811-20640-01.dmp
BugCheck 3B, {c0000005, fffff80002d8e8f8, fffff88006acfd90, 0}
Probably caused by : ntkrnlmp.exe ( nt!ObpLookupDirectoryEntry+358 )

050711-25140-01.dmp
BugCheck 50, {fffff10006ff8498, 1, fffff88013d67685, 7}
Could not read faulting driver name
Probably caused by : dxgkrnl.sys ( dxgkrnl!DXGCONTEXT::Render+9fd )

050811-30015-01.dmp
BugCheck 3B, {c0000005, fffff88013d54ec7, fffff880034fb120, 0}
Probably caused by : ntkrnlmp.exe ( nt!ExReleaseResourceAndLeaveCriticalRegion+12 )




Remove either pair of sticks from slots 1,2 or 3,4. Then load bios setup defaults and enjoy.


CRASH DUMPS

Code:
Microsoft (R) Windows Debugger Version 6.12.0002.633 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.


Loading Dump File [F:\DMP\040911-43531-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available

Symbol search path is: SRV*c:\websymbols*http://msdl.microsoft.com/download/symbols
Executable search path is: 
Windows 7 Kernel Version 7601 (Service Pack 1) MP (2 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS
Built by: 7601.17514.amd64fre.win7sp1_rtm.101119-1850
Machine Name:
Kernel base = 0xfffff800`02868000 PsLoadedModuleList = 0xfffff800`02aade90
Debug session time: Sat Apr  9 18:12:52.390 2011 (UTC - 4:00)
System Uptime: 0 days 0:00:46.937
Loading Kernel Symbols
...............................................................
................................................................
.................
Loading User Symbols
Loading unloaded module list
....
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

Use !analyze -v to get detailed debugging information.

BugCheck 50, {fffff89fc2f83fcf, 1, fffff88013d0a3ed, 5}


Could not read faulting driver name
Probably caused by : hardware ( dxgkrnl!DXGDEVICE::Unlock+2bd )

Followup: MachineOwner
---------

1: kd> !analyze -v
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

PAGE_FAULT_IN_NONPAGED_AREA (50)
Invalid system memory was referenced.  This cannot be protected by try-except,
it must be protected by a Probe.  Typically the address is just plain bad or it
is pointing at freed memory.
Arguments:
Arg1: fffff89fc2f83fcf, memory referenced.
Arg2: 0000000000000001, value 0 = read operation, 1 = write operation.
Arg3: fffff88013d0a3ed, If non-zero, the instruction address which referenced the bad memory
	address.
Arg4: 0000000000000005, (reserved)

Debugging Details:
------------------


Could not read faulting driver name

WRITE_ADDRESS: GetPointerFromAddress: unable to read from fffff80002b190e8
 fffff89fc2f83fcf 

FAULTING_IP: 
dxgkrnl!DXGDEVICE::Unlock+2bd
fffff880`13d0a3ed d08bcfff15c2    ror     byte ptr [rbx-3DEA0031h],1

MM_INTERNAL_CODE:  5

CUSTOMER_CRASH_COUNT:  1

DEFAULT_BUCKET_ID:  VISTA_DRIVER_FAULT

BUGCHECK_STR:  0x50

PROCESS_NAME:  csrss.exe

CURRENT_IRQL:  0

TRAP_FRAME:  fffff88002b97fe0 -- (.trap 0xfffff88002b97fe0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=fffffa80053f5a30 rbx=0000000000000000 rcx=fffff88013d0a3d2
rdx=fffffa80053f5a30 rsi=0000000000000000 rdi=0000000000000000
rip=fffff88013d0a3ed rsp=fffff88002b98170 rbp=fffff88002b982b0
 r8=000000000001a4fa  r9=0000000000000009 r10=0000000000000000
r11=fffff880019e9120 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0         nv up ei ng nz na po nc
dxgkrnl!DXGDEVICE::Unlock+0x2bd:
fffff880`13d0a3ed d08bcfff15c2    ror     byte ptr [rbx-3DEA0031h],1 ds:ffffffff`c215ffcf=??
Resetting default scope

MISALIGNED_IP: 
dxgkrnl!DXGDEVICE::Unlock+2bd
fffff880`13d0a3ed d08bcfff15c2    ror     byte ptr [rbx-3DEA0031h],1

LAST_CONTROL_TRANSFER:  from fffff80002892c6f to fffff800028e8640

STACK_TEXT:  
fffff880`02b97e78 fffff800`02892c6f : 00000000`00000050 fffff89f`c2f83fcf 00000000`00000001 fffff880`02b97fe0 : nt!KeBugCheckEx
fffff880`02b97e80 fffff800`028e676e : 00000000`00000001 fffff89f`c2f83fcf fffff880`02b98000 fffff8a0`00e24000 : nt! ?? ::FNODOBFM::`string'+0x44891
fffff880`02b97fe0 fffff880`13d0a3ed : fffff8a0`400000c0 fffff880`13cd7906 fffff8a0`00e19470 fffff880`13cac3af : nt!KiPageFault+0x16e
fffff880`02b98170 fffff880`13cefa81 : fffff8a0`00e24000 fffff880`02b982b0 fffff900`c00afd00 00000000`00000000 : dxgkrnl!DXGDEVICE::Unlock+0x2bd
fffff880`02b98200 fffff960`00624c36 : fffff900`c00b7020 00000000`00000030 00000000`00000030 fffff900`c1a45a10 : dxgkrnl!DxgkCddUnlock+0x181
fffff880`02b98270 fffff960`0062606c : ffffffff`fffd7476 00000000`0104002e 00000000`00000001 00000000`00000000 : cdd!CddPresentBlt+0x2be
fffff880`02b989b0 fffff800`02b85cce : 00000000`0587beb4 fffffa80`06c32b60 00000000`00000080 fffffa80`06b42730 : cdd!PresentWorkerThread+0xd00
fffff880`02b98d40 fffff800`028d9fe6 : fffff800`02a5ae80 fffffa80`06c32b60 fffff800`02a68cc0 fffff880`01261cb0 : nt!PspSystemThreadStartup+0x5a
fffff880`02b98d80 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KxStartSystemThread+0x16


STACK_COMMAND:  kb

FOLLOWUP_IP: 
dxgkrnl!DXGDEVICE::Unlock+2bd
fffff880`13d0a3ed d08bcfff15c2    ror     byte ptr [rbx-3DEA0031h],1

SYMBOL_STACK_INDEX:  3

SYMBOL_NAME:  dxgkrnl!DXGDEVICE::Unlock+2bd

FOLLOWUP_NAME:  MachineOwner

IMAGE_NAME:  hardware

DEBUG_FLR_IMAGE_TIMESTAMP:  0

MODULE_NAME: hardware

FAILURE_BUCKET_ID:  X64_IP_MISALIGNED_dxgkrnl.sys

BUCKET_ID:  X64_IP_MISALIGNED_dxgkrnl.sys

Followup: MachineOwner
---------



Microsoft (R) Windows Debugger Version 6.12.0002.633 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.


Loading Dump File [F:\DMP\050811-20640-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available

Mini Kernel Dump does not have process information
Symbol search path is: SRV*c:\websymbols*http://msdl.microsoft.com/download/symbols
Executable search path is: 
Windows 7 Kernel Version 7601 (Service Pack 1) MP (2 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS
Built by: 7601.17514.amd64fre.win7sp1_rtm.101119-1850
Machine Name:
Kernel base = 0xfffff800`02a13000 PsLoadedModuleList = 0xfffff800`02c58e90
Debug session time: Sun May  8 20:17:06.464 2011 (UTC - 4:00)
System Uptime: 0 days 0:04:14.996
Loading Kernel Symbols
...............................................
Loading User Symbols
Missing image name, possible paged-out or corrupt data.
Loading unloaded module list
.Missing image name, possible paged-out or corrupt data.
..Missing image name, possible paged-out or corrupt data.
.Missing image name, possible paged-out or corrupt data.
.Missing image name, possible paged-out or corrupt data.
.Missing image name, possible paged-out or corrupt data.
..Missing image name, possible paged-out or corrupt data.
..Missing image name, possible paged-out or corrupt data.
..
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

Use !analyze -v to get detailed debugging information.

BugCheck 3B, {c0000005, fffff80002d8e8f8, fffff88006acfd90, 0}

Probably caused by : ntkrnlmp.exe ( nt!ObpLookupDirectoryEntry+358 )

Followup: MachineOwner
---------

1: kd> !analyze -v
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

SYSTEM_SERVICE_EXCEPTION (3b)
An exception happened while executing a system service routine.
Arguments:
Arg1: 00000000c0000005, Exception code that caused the bugcheck
Arg2: fffff80002d8e8f8, Address of the instruction which caused the bugcheck
Arg3: fffff88006acfd90, Address of the context record for the exception that caused the bugcheck
Arg4: 0000000000000000, zero.

Debugging Details:
------------------


EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - The instruction at 0x%08lx referenced memory at 0x%08lx. The memory could not be %s.

FAULTING_IP: 
nt!ObpLookupDirectoryEntry+358
fffff800`02d8e8f8 488b7008        mov     rsi,qword ptr [rax+8]

CONTEXT:  fffff88006acfd90 -- (.cxr 0xfffff88006acfd90)
rax=00fff8a0015ef090 rbx=0000000000000000 rcx=fffffa8006bf3060
rdx=0000000000000011 rsi=0000000000000000 rdi=fffffa8003bb98c8
rip=fffff80002d8e8f8 rsp=fffff88006ad0770 rbp=fffffa8006bf3060
 r8=0000000000000040  r9=0000000000000001 r10=fffff8a0015cdeb0
r11=0000000000000000 r12=0000000000000001 r13=0000000000000000
r14=fffff8a0015cdfb8 r15=fffff8a0015cdeb0
iopl=0         nv up ei pl nz na po nc
cs=0010  ss=0018  ds=002b  es=002b  fs=0053  gs=002b             efl=00010206
nt!ObpLookupDirectoryEntry+0x358:
fffff800`02d8e8f8 488b7008        mov     rsi,qword ptr [rax+8] ds:002b:00fff8a0`015ef098=????????????????
Resetting default scope

CUSTOMER_CRASH_COUNT:  1

DEFAULT_BUCKET_ID:  VISTA_DRIVER_FAULT

BUGCHECK_STR:  0x3B

CURRENT_IRQL:  0

LAST_CONTROL_TRANSFER:  from 0000000000000000 to fffff80002d8e8f8

STACK_TEXT:  
fffff880`06ad0770 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!ObpLookupDirectoryEntry+0x358


FOLLOWUP_IP: 
nt!ObpLookupDirectoryEntry+358
fffff800`02d8e8f8 488b7008        mov     rsi,qword ptr [rax+8]

SYMBOL_STACK_INDEX:  0

SYMBOL_NAME:  nt!ObpLookupDirectoryEntry+358

FOLLOWUP_NAME:  MachineOwner

MODULE_NAME: nt

IMAGE_NAME:  ntkrnlmp.exe

DEBUG_FLR_IMAGE_TIMESTAMP:  4ce7951a

STACK_COMMAND:  .cxr 0xfffff88006acfd90 ; kb

FAILURE_BUCKET_ID:  X64_0x3B_nt!ObpLookupDirectoryEntry+358

BUCKET_ID:  X64_0x3B_nt!ObpLookupDirectoryEntry+358

Followup: MachineOwner
---------



Microsoft (R) Windows Debugger Version 6.12.0002.633 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.


Loading Dump File [F:\DMP\050711-25140-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available

Symbol search path is: SRV*c:\websymbols*http://msdl.microsoft.com/download/symbols
Executable search path is: 
Windows 7 Kernel Version 7601 (Service Pack 1) MP (2 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS
Built by: 7601.17514.amd64fre.win7sp1_rtm.101119-1850
Machine Name:
Kernel base = 0xfffff800`02a5a000 PsLoadedModuleList = 0xfffff800`02c9fe90
Debug session time: Sat May  7 20:15:48.491 2011 (UTC - 4:00)
System Uptime: 0 days 0:02:13.038
Loading Kernel Symbols
...............................................................
................................................................
.....................................
Loading User Symbols
Loading unloaded module list
....
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

Use !analyze -v to get detailed debugging information.

BugCheck 50, {fffff10006ff8498, 1, fffff88013d67685, 7}


Could not read faulting driver name
Probably caused by : dxgkrnl.sys ( dxgkrnl!DXGCONTEXT::Render+9fd )

Followup: MachineOwner
---------

1: kd> !analyze -v
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

PAGE_FAULT_IN_NONPAGED_AREA (50)
Invalid system memory was referenced.  This cannot be protected by try-except,
it must be protected by a Probe.  Typically the address is just plain bad or it
is pointing at freed memory.
Arguments:
Arg1: fffff10006ff8498, memory referenced.
Arg2: 0000000000000001, value 0 = read operation, 1 = write operation.
Arg3: fffff88013d67685, If non-zero, the instruction address which referenced the bad memory
	address.
Arg4: 0000000000000007, (reserved)

Debugging Details:
------------------


Could not read faulting driver name

WRITE_ADDRESS: GetPointerFromAddress: unable to read from fffff80002d0b0e8
 fffff10006ff8498 

FAULTING_IP: 
dxgkrnl!DXGCONTEXT::Render+9fd
fffff880`13d67685 899c2490010000  mov     dword ptr [rsp+190h],ebx

MM_INTERNAL_CODE:  7

CUSTOMER_CRASH_COUNT:  1

DEFAULT_BUCKET_ID:  VISTA_DRIVER_FAULT

BUGCHECK_STR:  0x50

PROCESS_NAME:  csrss.exe

CURRENT_IRQL:  0

TRAP_FRAME:  fffff880037fbe60 -- (.trap 0xfffff880037fbe60)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=fffff880037fc184 rbx=0000000000000000 rcx=fffff880037fc218
rdx=0000000000000000 rsi=0000000000000000 rdi=0000000000000000
rip=fffff88013d67685 rsp=fffff880037fbff0 rbp=fffff880037fc7f0
 r8=0000000000000000  r9=0000000000000000 r10=0000000000000000
r11=fffff88001439120 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0         nv up ei pl zr na po nc
dxgkrnl!DXGCONTEXT::Render+0x9fd:
fffff880`13d67685 899c2490010000  mov     dword ptr [rsp+190h],ebx ss:fffff880`037fc180=00000200
Resetting default scope

LAST_CONTROL_TRANSFER:  from fffff80002a84bf7 to fffff80002ada640

STACK_TEXT:  
fffff880`037fbcf8 fffff800`02a84bf7 : 00000000`00000050 fffff100`06ff8498 00000000`00000001 fffff880`037fbe60 : nt!KeBugCheckEx
fffff880`037fbd00 fffff800`02ad876e : 00000000`00000001 fffff100`06ff8498 00000000`00000000 00000000`00000200 : nt! ?? ::FNODOBFM::`string'+0x44811
fffff880`037fbe60 fffff880`13d67685 : 00000000`00000000 00000000`00000200 fffff880`037fc7f0 00000000`00000000 : nt!KiPageFault+0x16e
fffff880`037fbff0 fffff880`13d3dfb2 : fffff8a0`00000001 fffff8a0`00000114 fffff880`037fc638 fffff880`00000002 : dxgkrnl!DXGCONTEXT::Render+0x9fd
fffff880`037fc600 fffff960`0078b264 : 00000000`00000000 00000000`00000000 fffff900`c00c1020 00000000`00000000 : dxgkrnl!DxgkCddGdiCommand+0x1ea
fffff880`037fc690 fffff960`007895d5 : fffffa80`0653fc30 fffffa80`0653fc30 00000000`00000001 fffff900`c00c1020 : cdd!CHwCommandBuffer::FlushGdiCommands+0xb4
fffff880`037fc980 fffff960`00785c6e : ffffffff`fffd7476 00000000`00000010 00000000`00000001 fffff900`00000000 : cdd!CDDPDEV::FlushGdiOutput+0x81
fffff880`037fc9b0 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : cdd!PresentWorkerThread+0x902


STACK_COMMAND:  kb

FOLLOWUP_IP: 
dxgkrnl!DXGCONTEXT::Render+9fd
fffff880`13d67685 899c2490010000  mov     dword ptr [rsp+190h],ebx

SYMBOL_STACK_INDEX:  3

SYMBOL_NAME:  dxgkrnl!DXGCONTEXT::Render+9fd

FOLLOWUP_NAME:  MachineOwner

MODULE_NAME: dxgkrnl

IMAGE_NAME:  dxgkrnl.sys

DEBUG_FLR_IMAGE_TIMESTAMP:  4ce799fa

FAILURE_BUCKET_ID:  X64_0x50_dxgkrnl!DXGCONTEXT::Render+9fd

BUCKET_ID:  X64_0x50_dxgkrnl!DXGCONTEXT::Render+9fd

Followup: MachineOwner
---------




Microsoft (R) Windows Debugger Version 6.12.0002.633 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.


Loading Dump File [F:\DMP\050811-30015-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available

Symbol search path is: SRV*c:\websymbols*http://msdl.microsoft.com/download/symbols
Executable search path is: 
Windows 7 Kernel Version 7601 (Service Pack 1) MP (2 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS
Built by: 7601.17514.amd64fre.win7sp1_rtm.101119-1850
Machine Name:
Kernel base = 0xfffff800`02a1b000 PsLoadedModuleList = 0xfffff800`02c60e90
Debug session time: Sun May  8 20:22:18.843 2011 (UTC - 4:00)
System Uptime: 0 days 0:00:54.390
Loading Kernel Symbols
...............................................
Loading User Symbols
Loading unloaded module list
....
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

Use !analyze -v to get detailed debugging information.

BugCheck 3B, {c0000005, fffff88013d54ec7, fffff880034fb120, 0}

Probably caused by : ntkrnlmp.exe ( nt!ExReleaseResourceAndLeaveCriticalRegion+12 )

Followup: MachineOwner
---------

0: kd> !analyze -v
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

SYSTEM_SERVICE_EXCEPTION (3b)
An exception happened while executing a system service routine.
Arguments:
Arg1: 00000000c0000005, Exception code that caused the bugcheck
Arg2: fffff88013d54ec7, Address of the instruction which caused the bugcheck
Arg3: fffff880034fb120, Address of the context record for the exception that caused the bugcheck
Arg4: 0000000000000000, zero.

Debugging Details:
------------------


EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - The instruction at 0x%08lx referenced memory at 0x%08lx. The memory could not be %s.

FAULTING_IP: 
+13
fffff880`13d54ec7 7533            jne     fffff880`13d54efc

CONTEXT:  fffff880034fb120 -- (.cxr 0xfffff880034fb120)
rax=fffff8a001aa2ac0 rbx=000000000000080c rcx=fffffa8006a0eb30
rdx=0000000000000001 rsi=000000000373fc20 rdi=fffff8a001aa2ac0
rip=fffff88013d54ec7 rsp=fffff880034fbb00 rbp=fffff880034fbca0
 r8=000000000373fae8  r9=0000000000000800 r10=fffff960001be4e0
r11=000007fffffd6000 r12=0000000000000001 r13=000000000373fb28
r14=0000000000000001 r15=0000000000000000
iopl=0         nv up ei ng nz na po nc
cs=0010  ss=0018  ds=002b  es=002b  fs=0053  gs=002b             efl=00010286
fffff880`13d54ec7 7533            jne     fffff880`13d54efc              [br=1]
Resetting default scope

CUSTOMER_CRASH_COUNT:  1

DEFAULT_BUCKET_ID:  VISTA_DRIVER_FAULT

BUGCHECK_STR:  0x3B

PROCESS_NAME:  dwm.exe

CURRENT_IRQL:  0

LAST_CONTROL_TRANSFER:  from 00000000000007ff to fffff88013d54ec7

STACK_TEXT:  
fffff880`034fbb00 00000000`000007ff : 00000000`0000000f 00000000`0373fc20 fffff8a0`02541c00 00000000`000000e4 : 0xfffff880`13d54ec7
fffff880`034fbb08 00000000`0000000f : 00000000`0373fc20 fffff8a0`02541c00 00000000`000000e4 00000000`0000080c : 0x7ff
fffff880`034fbb10 00000000`0373fc20 : fffff8a0`02541c00 00000000`000000e4 00000000`0000080c 00000000`000000e4 : 0xf
fffff880`034fbb18 fffff8a0`02541c00 : 00000000`000000e4 00000000`0000080c 00000000`000000e4 fffff960`002b86c8 : 0x373fc20
fffff880`034fbb20 00000000`000000e4 : 00000000`0000080c 00000000`000000e4 fffff960`002b86c8 000007fe`faa9c610 : 0xfffff8a0`02541c00
fffff880`034fbb28 00000000`0000080c : 00000000`000000e4 fffff960`002b86c8 000007fe`faa9c610 fffff8a0`01aa2ac0 : 0xe4
fffff880`034fbb30 00000000`000000e4 : fffff960`002b86c8 000007fe`faa9c610 fffff8a0`01aa2ac0 00000000`00000800 : 0x80c
fffff880`034fbb38 fffff960`002b86c8 : 000007fe`faa9c610 fffff8a0`01aa2ac0 00000000`00000800 00000000`00000800 : 0xe4
fffff880`034fbb40 000007fe`faa9c610 : fffff8a0`01aa2ac0 00000000`00000800 00000000`00000800 fffff880`034fbc38 : 0xfffff960`002b86c8
fffff880`034fbb48 fffff8a0`01aa2ac0 : 00000000`00000800 00000000`00000800 fffff880`034fbc38 fffff800`02aa5402 : 0x7fe`faa9c610
fffff880`034fbb50 00000000`00000800 : 00000000`00000800 fffff880`034fbc38 fffff800`02aa5402 00000000`00000000 : 0xfffff8a0`01aa2ac0
fffff880`034fbb58 00000000`00000800 : fffff880`034fbc38 fffff800`02aa5402 00000000`00000000 00000000`00000000 : 0x800
fffff880`034fbb60 fffff880`034fbc38 : fffff800`02aa5402 00000000`00000000 00000000`00000000 00000000`00000000 : 0x800
fffff880`034fbb68 fffff800`02aa5402 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000800 : 0xfffff880`034fbc38
fffff880`034fbb70 fffff960`00255bb3 : fffff960`00307bd8 fffff800`00000000 fffff880`034fbbd8 fffff800`03014790 : nt!ExReleaseResourceAndLeaveCriticalRegion+0x12
fffff880`034fbba0 fffff960`00307bd8 : fffff800`00000000 fffff880`034fbbd8 fffff800`03014790 00000000`00000018 : 0xfffff960`00255bb3
fffff880`034fbba8 fffff800`00000000 : fffff880`034fbbd8 fffff800`03014790 00000000`00000018 000007fe`faa9c610 : 0xfffff960`00307bd8
fffff880`034fbbb0 fffff880`034fbbd8 : fffff800`03014790 00000000`00000018 000007fe`faa9c610 00000000`00000000 : 0xfffff800`00000000
fffff880`034fbbb8 fffff800`03014790 : 00000000`00000018 000007fe`faa9c610 00000000`00000000 00000000`002a56c0 : 0xfffff880`034fbbd8
fffff880`034fbbc0 fffff960`001be4f7 : fffffa80`06c80b60 00000000`00000001 00000000`00000020 00000000`0373fc20 : hal!KeQueryPerformanceCounter+0x9c
fffff880`034fbbf0 fffffa80`06c80b60 : 00000000`00000001 00000000`00000020 00000000`0373fc20 fffffa80`06c80b60 : 0xfffff960`001be4f7
fffff880`034fbbf8 00000000`00000001 : 00000000`00000020 00000000`0373fc20 fffffa80`06c80b60 fffff800`02a9a8d3 : 0xfffffa80`06c80b60
fffff880`034fbc00 00000000`00000020 : 00000000`0373fc20 fffffa80`06c80b60 fffff800`02a9a8d3 fffffa80`00000800 : 0x1
fffff880`034fbc08 00000000`0373fc20 : fffffa80`06c80b60 fffff800`02a9a8d3 fffffa80`00000800 00000000`0373fb90 : 0x20
fffff880`034fbc10 fffffa80`06c80b60 : fffff800`02a9a8d3 fffffa80`00000800 00000000`0373fb90 000007fe`faa9c610 : 0x373fc20
fffff880`034fbc18 fffff800`02a9a8d3 : fffffa80`00000800 00000000`0373fb90 000007fe`faa9c610 fffffa80`00000000 : 0xfffffa80`06c80b60
fffff880`034fbc20 000007fe`fea8120a : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x13
00000000`0373fae8 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x7fe`fea8120a


FOLLOWUP_IP: 
nt!ExReleaseResourceAndLeaveCriticalRegion+12
fffff800`02aa5402 654c8b1c2588010000 mov   r11,qword ptr gs:[188h]

SYMBOL_STACK_INDEX:  e

SYMBOL_NAME:  nt!ExReleaseResourceAndLeaveCriticalRegion+12

FOLLOWUP_NAME:  MachineOwner

MODULE_NAME: nt

IMAGE_NAME:  ntkrnlmp.exe

DEBUG_FLR_IMAGE_TIMESTAMP:  4ce7951a

STACK_COMMAND:  .cxr 0xfffff880034fb120 ; kb

FAILURE_BUCKET_ID:  X64_0x3B_nt!ExReleaseResourceAndLeaveCriticalRegion+12

BUCKET_ID:  X64_0x3B_nt!ExReleaseResourceAndLeaveCriticalRegion+12

Followup: MachineOwner
---------




DRIVERS

Code:
start             end                 module name
fffff880`00eb7000 fffff880`00f0e000   ACPI     ACPI.sys     Sat Nov 20 04:19:16 2010 (4CE79294)
fffff880`00dec000 fffff880`00df7000   amdxata  amdxata.sys  Fri Mar 19 12:18:18 2010 (4BA3A3CA)
fffff880`00db9000 fffff880`00dc2000   atapi    atapi.sys    Mon Jul 13 19:19:47 2009 (4A5BC113)
fffff880`00dc2000 fffff880`00dec000   ataport  ataport.SYS  Sat Nov 20 04:19:15 2010 (4CE79293)
fffff880`00c00000 fffff880`00cc0000   CI       CI.dll       Sat Nov 20 08:12:36 2010 (4CE7C944)
fffff880`01967000 fffff880`01997000   CLASSPNP CLASSPNP.SYS Sat Nov 20 04:19:23 2010 (4CE7929B)
fffff880`00d0b000 fffff880`00d69000   CLFS     CLFS.SYS     Mon Jul 13 19:19:57 2009 (4A5BC11D)
fffff880`010ec000 fffff880`0115e000   cng      cng.sys      Sat Nov 20 05:08:45 2010 (4CE79E2D)
fffff880`01951000 fffff880`01967000   disk     disk.sys     Mon Jul 13 19:19:57 2009 (4A5BC11D)
fffff880`0107a000 fffff880`0108e000   fileinfo fileinfo.sys Mon Jul 13 19:34:25 2009 (4A5BC481)
fffff880`0102e000 fffff880`0107a000   fltmgr   fltmgr.sys   Sat Nov 20 04:19:24 2010 (4CE7929C)
fffff880`0122c000 fffff880`01236000   Fs_Rec   Fs_Rec.sys   Mon Jul 13 19:19:45 2009 (4A5BC111)
fffff880`01917000 fffff880`01951000   fvevol   fvevol.sys   Sat Nov 20 04:24:06 2010 (4CE793B6)
fffff880`01814000 fffff880`0185e000   fwpkclnt fwpkclnt.sys Sat Nov 20 04:21:37 2010 (4CE79321)
fffff800`03005000 fffff800`0304e000   hal      hal.dll      Sat Nov 20 08:00:25 2010 (4CE7C669)
fffff880`0190e000 fffff880`01917000   hwpolicy hwpolicy.sys Sat Nov 20 04:18:54 2010 (4CE7927E)
fffff800`00ba1000 fffff800`00bab000   kdcom    kdcom.dll    Sat Feb 05 11:52:49 2011 (4D4D8061)
fffff880`01200000 fffff880`0121b000   ksecdd   ksecdd.sys   Sat Nov 20 04:21:15 2010 (4CE7930B)
fffff880`0159e000 fffff880`015c9000   ksecpkg  ksecpkg.sys  Sat Nov 20 05:10:34 2010 (4CE79E9A)
fffff880`00cea000 fffff880`00cf7000   mcupdate_AuthenticAMD mcupdate_AuthenticAMD.dll Mon Jul 13 21:29:09 2009 (4A5BDF65)
fffff880`00cc0000 fffff880`00cda000   mountmgr mountmgr.sys Sat Nov 20 04:19:21 2010 (4CE79299)
fffff880`00f17000 fffff880`00f21000   msisadrv msisadrv.sys Mon Jul 13 19:19:26 2009 (4A5BC0FE)
fffff880`0108e000 fffff880`010ec000   msrpc    msrpc.sys    Sat Nov 20 04:21:56 2010 (4CE79334)
fffff880`018fc000 fffff880`0190e000   mup      mup.sys      Mon Jul 13 19:23:45 2009 (4A5BC201)
fffff880`0144b000 fffff880`0153e000   ndis     ndis.sys     Sat Nov 20 04:23:30 2010 (4CE79392)
fffff880`0153e000 fffff880`0159e000   NETIO    NETIO.SYS    Sat Nov 20 04:23:13 2010 (4CE79381)
fffff800`02a1b000 fffff800`03005000   nt       ntkrnlmp.exe Sat Nov 20 04:30:02 2010 (4CE7951A)
fffff880`01251000 fffff880`013f4000   Ntfs     Ntfs.sys     Thu Mar 10 22:39:39 2011 (4D79997B)
fffff880`00f61000 fffff880`00f76000   partmgr  partmgr.sys  Sat Nov 20 04:20:00 2010 (4CE792C0)
fffff880`00f21000 fffff880`00f54000   pci      pci.sys      Sat Nov 20 04:19:11 2010 (4CE7928F)
fffff880`00fe7000 fffff880`00fee000   pciide   pciide.sys   Mon Jul 13 19:19:49 2009 (4A5BC115)
fffff880`00fee000 fffff880`00ffe000   PCIIDEX  PCIIDEX.SYS  Mon Jul 13 19:19:48 2009 (4A5BC114)
fffff880`0121b000 fffff880`0122c000   pcw      pcw.sys      Mon Jul 13 19:19:27 2009 (4A5BC0FF)
fffff880`00cf7000 fffff880`00d0b000   PSHED    PSHED.dll    Mon Jul 13 21:32:23 2009 (4A5BE027)
fffff880`018c2000 fffff880`018fc000   rdyboost rdyboost.sys Sat Nov 20 04:43:10 2010 (4CE7982E)
fffff880`018ba000 fffff880`018c2000   spldr    spldr.sys    Mon May 11 12:56:27 2009 (4A0858BB)
fffff880`01610000 fffff880`01814000   tcpip    tcpip.sys    Sat Nov 20 04:25:52 2010 (4CE79420)
2dfff880`019cd000 2dfff880`019f7000   Unknown_Module_2dfff880_019cd000 Unknown_Module_2dfff880`019cd000 unavailable (00000000)
fffff880`00f54000 fffff880`00f61000   vdrvroot vdrvroot.sys Mon Jul 13 20:01:31 2009 (4A5BCADB)
fffff880`00d69000 fffff880`00da5000   vmbus    vmbus.sys    Sat Nov 20 04:57:29 2010 (4CE79B89)
fffff880`0185e000 fffff880`0186e000   vmstorfl vmstorfl.sys Sat Nov 20 04:57:30 2010 (4CE79B8A)
fffff880`00f76000 fffff880`00f8b000   volmgr   volmgr.sys   Sat Nov 20 04:19:28 2010 (4CE792A0)
fffff880`00f8b000 fffff880`00fe7000   volmgrx  volmgrx.sys  Sat Nov 20 04:20:43 2010 (4CE792EB)
fffff880`0186e000 fffff880`018ba000   volsnap  volsnap.sys  Sat Nov 20 04:20:08 2010 (4CE792C8)
fffff880`00e04000 fffff880`00ea8000   Wdf01000 Wdf01000.sys Mon Jul 13 19:22:07 2009 (4A5BC19F)
fffff880`00ea8000 fffff880`00eb7000   WDFLDR   WDFLDR.SYS   Mon Jul 13 19:19:54 2009 (4A5BC11A)
fffff880`00da5000 fffff880`00db9000   winhv    winhv.sys    Sat Nov 20 04:20:02 2010 (4CE792C2)
fffff880`00f0e000 fffff880`00f17000   WMILIB   WMILIB.SYS   Mon Jul 13 19:19:51 2009 (4A5BC117)

Unloaded modules:
fffff880`01997000 fffff880`019a5000   crashdmp.sys
    Timestamp: unavailable (00000000)
    Checksum:  00000000
    ImageSize:  0000E000
fffff880`019a5000 fffff880`019b1000   dump_ataport
    Timestamp: unavailable (00000000)
    Checksum:  00000000
    ImageSize:  0000C000
fffff880`019b1000 fffff880`019ba000   dump_atapi.s
    Timestamp: unavailable (00000000)
    Checksum:  00000000
    ImageSize:  00009000
fffff880`019ba000 fffff880`019cd000   dump_dumpfve
    Timestamp: unavailable (00000000)
    Checksum:  00000000
    ImageSize:  00013000
 
Joined
May 9, 2011
Messages
4
Reaction score
0
interesting

Interesting, I'll give it a try. But I am quite curious as to why it worked for over a year with all 4 sticks how they are currently configured and only started having BSOD's in the past couple weeks. Any idea if the switch to SP1 could have changed thing?
 
Joined
May 9, 2011
Messages
4
Reaction score
0
So far so good, I do miss my other 2 gigs of RAM. Some of the BIOS settings for the RAM were not set to auto for some reason, I don't remember changing them. Thanks for your help, I'll keep you posted if anything changes.
 

Ask a Question

Want to reply to this thread or ask your own question?

You'll need to choose a username for the site, which only take a couple of moments. After that, you can post your question and our members will help you out.

Ask a Question

Top