Guest Cyberat Posted March 19, 2012 Posted March 19, 2012 Greetings, Persistent BSOD that seems unrelated to any driver, as you see here in the last one, seamonkey.exe refers only to the downloader which was busy downloading a large file. No browser open. No other apps. running but itself, may have had screensaver kick in while I was away. This error can be duplicated consistently on high load file transfers between any drives, including USB. It happens randomly in 3D games, as well as Squeal of Death. No memory errors, not overheating, not overclocked, power above needs of pc, HDDs pass mfg. tests, APC unit recently installed, wireless PCI card recently installed. SATA drive randomly dissapears, on boot post or out of Windows (running off IDE which also had event viewer messages of "this drive disconnected unexpectedly"). I no longer know what's going on with my system, BSODs are usually 0xA, 0x50 (pagefile corrupt, fixable), 0xFE and 0x8E. Any help is welcome, please read my notes before posting, system config. at bottom of analysis. Thank You. Loading Dump File [C:\Mini031812-01.dmp] Mini Kernel Dump File: Only registers and stack trace are available Symbol search path is: C:\WINDOWS\Debug Symbols Executable search path is: Unable to load image ntoskrnl.exe, Win32 error 0n2 WARNING: Unable to verify timestamp for ntoskrnl.exe Windows XP Kernel Version 2600 (Service Pack 3) MP (2 procs) Free x86 compatible Product: WinNt, suite: TerminalServer SingleUserTS Machine Name: Kernel base = 0x804d7000 PsLoadedModuleList = 0x805634c0 Debug session time: Sun Mar 18 15:31:17.453 2012 (GMT-7) System Uptime: 0 days 14:38:35.169 Unable to load image ntoskrnl.exe, Win32 error 0n2 WARNING: Unable to verify timestamp for ntoskrnl.exe Loading Kernel Symbols ............................................................... ................................................................ ................ Loading User Symbols Loading unloaded module list .................... Bugcheck Analysis Use !analyze -v to get detailed debugging information. BugCheck 1000000A, {99bc2ff4, 2, 0, 804e7ed4} Unable to load image Ntfs.sys, Win32 error 0n2 WARNING: Unable to verify timestamp for Ntfs.sys Probably caused by : ntoskrnl.exe ( nt!PsReturnPoolQuota+75 ) Followup: MachineOwner --------- 0: kd> !analyze -v Bugcheck Analysis IRQL_NOT_LESS_OR_EQUAL (a) An attempt was made to access a pageable (or completely invalid) address at an interrupt request level (IRQL) that is too high. This is usually caused by drivers using improper addresses. If a kernel debugger is available get the stack backtrace. Arguments: Arg1: 99bc2ff4, memory referenced Arg2: 00000002, IRQL Arg3: 00000000, bitfield : bit 0 : value 0 = read operation, 1 = write operation bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status) Arg4: 804e7ed4, address which referenced memory Debugging Details: ------------------ READ_ADDRESS: 99bc2ff4 CURRENT_IRQL: 2 FAULTING_IP: nt!PsReturnPoolQuota+75 804e7ed4 8b7e0c mov edi,dword ptr [esi+0Ch] CUSTOMER_CRASH_COUNT: 1 DEFAULT_BUCKET_ID: DRIVER_FAULT BUGCHECK_STR: 0xA PROCESS_NAME: seamonkey.exe LAST_CONTROL_TRANSFER: from 80517b86 to 804e7ed4 STACK_TEXT: aa8da7f8 80517b86 00000000 d71e1000 00001000 nt!PsReturnPoolQuota+0x75 aa8da878 804f8582 d71e1000 084a0ccd 00000000 nt!MiDecommitPages+0x20b aa8da908 804f8748 88cf0098 084a0ccd aa8da94c nt!KeTerminateThread+0xf4 aa8da998 f7b56f83 88d5adc0 aa8dab64 00008000 nt!MmDeleteKernelStack+0x61 aa8dab88 f7b53c18 88ea8470 889b4c50 88fd6b58 Ntfs!NtfsCommonWrite+0x1d21 aa8dabec 804e13eb 8a6c4020 889b4c50 889b4c50 Ntfs!NtfsFsdWrite+0xf3 aa8dabec 889b4c50 8a6c4020 889b4c50 889b4c50 nt!KiTrap0D+0x4a5 WARNING: Frame IP not in any known module. Following frames may be wrong. aa8dac98 88d7c020 889b4c50 88d5adc0 00000001 0x889b4c50 aa8dac9c 889b4c50 88d5adc0 00000001 00000001 0x88d7c020 aa8daca0 88d5adc0 00000001 00000001 883da901 0x889b4c50 aa8daca4 00000000 00000001 883da901 00000001 0x88d5adc0 STACK_COMMAND: kb FOLLOWUP_IP: nt!PsReturnPoolQuota+75 804e7ed4 8b7e0c mov edi,dword ptr [esi+0Ch] SYMBOL_STACK_INDEX: 0 SYMBOL_NAME: nt!PsReturnPoolQuota+75 FOLLOWUP_NAME: MachineOwner MODULE_NAME: nt IMAGE_NAME: ntoskrnl.exe DEBUG_FLR_IMAGE_TIMESTAMP: 4ea6bb78 FAILURE_BUCKET_ID: 0xA_nt!PsReturnPoolQuota+75 BUCKET_ID: 0xA_nt!PsReturnPoolQuota+75 Followup: MachineOwner --------- 0: kd> lmvm nt start end module name 804d7000 80700000 nt M (pdb symbols) c:\windows\debug symbols\exe\ntoskrnl.pdb Loaded symbol image file: ntoskrnl.exe Image path: ntoskrnl.exe Image name: ntoskrnl.exe Timestamp: Tue Oct 25 06:36:56 2011 (4EA6BB78) CheckSum: 0020FAD4 ImageSize: 00229000 Translations: 0000.04b0 0000.04e4 0409.04b0 0409.04e4 Ratnest: MGE Case, ECS PT800CE-A1.1, Intel Prescott 3.0ghz, 2GB Mushkin DDR400 RAM, HIS ATI Radeon HD 3850 AGP, CLSB Audigy SE, Trendnet RTL8169 GB NIC, D-Link DWA-552 XtremeN Wireless NIC, Seagate 80gb SATA, Seagate 400GB IDE, LG 16x DVD-RW IDE, Antec 650W PSU, PS/2 KB & Mouse, 3 case fans, 2 hd fans, 1 cpu fan, 1 chipset fan, 1 psu fan, 1 video fan. Continue reading... Quote
Recommended Posts
Join the conversation
You can post now and register later. If you have an account, sign in now to post with your account.