New Posts  All Forums:Forum Nav:

help reading dump files

post #1 of 17
Thread Starter 
Hi guys,

i tried to install debugging tools to read my dump files but its giving big headaches...

so my pc is having bluescreens since i intalled a ssd i think, like 1 per month or something only when in idle and i dont know why, is there someone kind enought to read my dump file and tell me whats wrong?

thank you very much
phantom
(11 items)
 
  
Reply
phantom
(11 items)
 
  
Reply
post #2 of 17
Sure just upload it.
post #3 of 17
Thread Starter 
phantom
(11 items)
 
  
Reply
phantom
(11 items)
 
  
Reply
post #4 of 17
Scan for malware / viruses, if nothing is detected run memtest86+.

This is my initial impression of the dump summary.
I'm digging deeper but "memory corruption" bugchecks are very tricky.
Edited by Yoyo1555 - 7/3/13 at 6:55am
post #5 of 17
Alright.
MachineID (Click to show)
4: kd> !sysinfo machineid
Machine ID Information [From Smbios 2.5, DMIVersion 37, Size=1486]
BiosMajorRelease = 6
BiosMinorRelease = 0
BiosVendor = Phoenix Technologies, LTD
BiosVersion = 6.00 PG
BiosReleaseDate = 08/25/2011
SystemManufacturer = OEM
SystemProductName = OEM
SystemFamily =
SystemVersion = OEM
SystemSKU =
BaseBoardManufacturer = EVGA
BaseBoardProduct = X58 SLI FTW3
BaseBoardVersion = Tylersburg

BIOS is pretty old, but it's 'ok'



!analyze -v (Click to show)
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************

Use !analyze -v to get detailed debugging information.

BugCheck A, {48, 2, 1, fffff800030bb169}

Probably caused by : memory_corruption ( nt!MiRestoreTransitionPte+109 )

Followup: MachineOwner

4: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************

IRQL_NOT_LESS_OR_EQUAL (a)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high. This is usually
caused by drivers using improper addresses.
If a kernel debugger is available get the stack backtrace.
Arguments:
Arg1: 0000000000000048, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000001, bitfield :
bit 0 : value 0 = read operation, 1 = write operation
bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
Arg4: fffff800030bb169, address which referenced memory

Debugging Details:


WRITE_ADDRESS: GetPointerFromAddress: unable to read from fffff8000330e100
GetUlongFromAddress: unable to read from fffff8000330e1c0
0000000000000048 Nonpaged pool

CURRENT_IRQL: 2

FAULTING_IP:
nt!MiRestoreTransitionPte+109
fffff800`030bb169 f00fba6b481f lock bts dword ptr [rbx+48h],1Fh

CUSTOMER_CRASH_COUNT: 1

DEFAULT_BUCKET_ID: WIN7_DRIVER_FAULT

BUGCHECK_STR: 0xA

PROCESS_NAME: BTNext.exe

TRAP_FRAME: fffff8800c1ee220 -- (.trap 0xfffff8800c1ee220)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000002 rbx=0000000000000000 rcx=fffff88003447007
rdx=0000098000000000 rsi=0000000000000000 rdi=0000000000000000
rip=fffff800030bb169 rsp=fffff8800c1ee3b0 rbp=0000000000000000
r8=0000000000000001 r9=fffff80003311d01 r10=0000000000000002
r11=0000000000000001 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei pl nz na pe nc
nt!MiRestoreTransitionPte+0x109:
fffff800`030bb169 f00fba6b481f lock bts dword ptr [[B][U]rbx+48h[/U][/B]],1Fh ds:00000000`00000048=????????
Resetting default scope

LAST_CONTROL_TRANSFER: from fffff800030d1c29 to fffff800030d2680

STACK_TEXT:
fffff880`0c1ee0d8 fffff800`030d1c29 : 00000000`0000000a 00000000`00000048 00000000`00000002 00000000`00000001 : nt!KeBugCheckEx
fffff880`0c1ee0e0 fffff800`030d08a0 : fffff880`0c1ee3d0 fffff880`0163e475 fffff8a0`04edcc70 00000000`00000000 : nt!KiBugCheckDispatch+0x69
fffff880`0c1ee220 fffff800`030bb169 : fffffa80`06d06c80 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiPageFault+0x260
fffff880`0c1ee3b0 fffff800`0319597e : 00000000`00000002 fffff880`00000001 fffffa80`06d06c80 fffff800`03311d68 : nt!MiRestoreTransitionPte+0x109
fffff880`0c1ee440 fffff800`03092b5f : fa801346`64a004c0 fffff880`0c1ee500 00000000`0000003c 00000000`00000000 : nt!MiRemoveLowestPriorityStandbyPage+0x21e
fffff880`0c1ee4c0 fffff800`03374d92 : fffffa80`12dbccc0 00000000`00000001 fffffa80`12dbccc0 fffffa80`135f7b50 : nt!MiPfPutPagesInTransition+0x826
fffff880`0c1ee630 fffff800`030c1713 : fffffa80`12dbccc0 00000001`0b234000 00000000`00004000 fffff980`02534000 : nt!MmPrefetchForCacheManager+0x8e
fffff880`0c1ee680 fffff800`033c0f40 : 00000000`00004000 00000001`0b234000 00000001`0b234000 fffff880`0c1ee7b0 : nt!CcFetchDataForRead+0xd3
fffff880`0c1ee6e0 fffff880`016cdd7f : fffff880`00000000 00000001`00000005 fffffa80`0000c000 fffffa80`1094d001 : nt!CcCopyRead+0x180
fffff880`0c1ee7a0 fffff880`01201098 : fffffa80`1094d070 fffffa80`1170c998 00000000`00000002 fffffa80`1094d001 : Ntfs!NtfsCopyReadA+0x18f
fffff880`0c1ee980 fffff880`012048ba : fffff880`0c1eea50 00000000`094e4003 00000000`094e4000 fffffa80`1094d000 : fltmgr!FltpPerformFastIoCall+0x88
fffff880`0c1ee9e0 fffff880`01222630 : fffffa80`1094d070 00000000`00000000 fffff880`0c1eeb40 00000000`00004000 : fltmgr!FltpPassThroughFastIo+0xda
fffff880`0c1eea20 fffff800`033c0a79 : fffffa80`1094d070 fffff800`00000001 fffffa80`0d3ff8e0 fffffa80`1094d070 : fltmgr!FltpFastIoRead+0x1d0
fffff880`0c1eeac0 fffff800`030d1913 : 00000000`00000660 00000000`00000000 00000000`00000000 00000000`00000000 : nt!NtReadFile+0x417
fffff880`0c1eebb0 00000000`75342e09 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x13
00000000`052cf0f8 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x75342e09


STACK_COMMAND: kb

FOLLOWUP_IP:
nt!MiRestoreTransitionPte+109
fffff800`030bb169 f00fba6b481f lock bts dword ptr [rbx+48h],1Fh

SYMBOL_STACK_INDEX: 3

SYMBOL_NAME: nt!MiRestoreTransitionPte+109

FOLLOWUP_NAME: MachineOwner

MODULE_NAME: nt

DEBUG_FLR_IMAGE_TIMESTAMP: 5147d600

IMAGE_NAME: memory_corruption

FAILURE_BUCKET_ID: X64_0xA_nt!MiRestoreTransitionPte+109

BUCKET_ID: X64_0xA_nt!MiRestoreTransitionPte+109

Followup: MachineOwner


We can see thet BTnext.exe might have something to do with this dump.
A torrent software of sort.



Drivers, Drivers Everywhere! (Click to show)
Old (very) / 3rd party.

RTCore64.sys - Wed May 25 09:39:12 2005 - http://carrona.org/drivers/driver.php?id=RTCore64.sys
mvxxmm.sys - Thu Jul 01 04:54:57 2010 - http://carrona.org/drivers/driver.php?id=mvxxmm.sys
mv91cons.sys - Mon Jul 19 06:25:41 2010 - http://carrona.org/drivers/driver.php?id=mv91cons.sys
mv91xx.sys - Thu Jul 01 04:55:14 2010 - http://carrona.org/drivers/driver.php?id=mv91xx.sys [same family as above].
nusb3hub.sys - Fri Jan 22 05:22:18 2010 - http://carrona.org/drivers/driver.php?id=nusb3hub.sys
nusb3xhc.sys - Fri Jan 22 05:22:21 2010 - http://carrona.org/drivers/driver.php?id=nusb3xhc.sys [same family as above].
RTKVHD64.sys - Mon Feb 08 12:24:50 2010 - http://carrona.org/drivers/driver.php?id=RTKVHD64.sys
amdxata.sys - Fri Mar 19 18:18:18 2010 - http://carrona.org/drivers/driver.php?id=amdxata.sys
SiLib.sys - Fri Jul 16 01:08:26 2010 - http://carrona.org/drivers/driver.php?id=SiLib.sys
SiUSBXp.sys - Fri Jul 16 01:27:13 2010 - http://carrona.org/drivers/driver.php?id=SiUSBXp.sys [same family as above].
Rt64win7.sys - Fri Jun 10 09:33:15 2011 - http://carrona.org/drivers/driver.php?id=Rt64win7.sys
idmwfp.sys - Wed Jul 06 17:37:41 2011 - http://carrona.org/drivers/driver.php?id=idmwfp.sys
SASKUTIL64.SYS - Wed Jul 13 00:00:01 2011 - http://carrona.org/drivers/driver.php?id=SASKUTIL64.SYS
SASDIFSV64.SYS Fri Jul 22 02:03:00 2011 - [same family as above].
gfibto.sys - Fri Sep 02 04:31:28 2011 - http://carrona.org/drivers/driver.php?id=gfibto.sys
kerneld.x64 - Wed Aug 08 15:15:51 2012 - http://carrona.org/drivers/driver.php?id=kerneld.x64
aswKbd.SYS - Wed Oct 31 00:43:28 2012 - http://carrona.org/drivers/driver.php?id=aswKbd.SYS
HWiNFO64A.SYS - Wed Nov 14 13:15:59 2012 - http://carrona.org/drivers/driver.php?id=HWiNFO64A.SYS
iaStorA.sys - Mon Nov 19 22:09:40 2012 - http://carrona.org/drivers/driver.php?id=iaStorA.sys
iaStorF.sys - Mon Nov 19 22:09:43 2012 - http://carrona.org/drivers/driver.php?id=iaStorF.sys


Please update* these driver.
(*uninstalling unused software is preferable).
post #6 of 17
Thread Starter 
http://www.evga.com/support/download/default.aspx

As you can see here the latest bios is 6 days older then the one i have. I will do the flash ...

Btnext is in fact a torrent software i will try to update it might solve the bug

Im now updating the drivers and getting rid of all i dont need

The antivirus and anti malware did't detected a thing. I am using avast as a antivirus and superantispyware and ad-aware as anti malware.

Thank you very much for your time wink.gif
phantom
(11 items)
 
  
Reply
phantom
(11 items)
 
  
Reply
post #7 of 17
Keep posting with news!
post #8 of 17
Quote:
Originally Posted by phileps View Post

http://www.evga.com/support/download/default.aspx

As you can see here the latest bios is 6 days older then the one i have. I will do the flash ...

Btnext is in fact a torrent software i will try to update it might solve the bug

Im now updating the drivers and getting rid of all i dont need

The antivirus and anti malware did't detected a thing. I am using avast as a antivirus and superantispyware and ad-aware as anti malware.

Thank you very much for your time wink.gif

Any updates?
post #9 of 17
Thread Starter 
its running well for now, we could have solve it but like i said it bsod's like one time per month but for now everything is fine wink.gif

thanks wink.gif
phantom
(11 items)
 
  
Reply
phantom
(11 items)
 
  
Reply
post #10 of 17
So far so good then (touchwood), Update in about a month or so thumb.gif .
New Posts  All Forums:Forum Nav:
  Return Home
  Back to Forum: Crash Analysis and Debugging