Jump to content

0xA ntoskrnl.exe BSOD


Recommended Posts

Guest Cyberat
Posted

Greetings,

Persistent BSOD that seems unrelated to any driver, as you see here in the last one, seamonkey.exe refers only to the downloader which was busy downloading a large file. No browser open. No other apps. running but itself, may have had screensaver kick in while I was away. This error can be duplicated consistently on high load file transfers between any drives, including USB. It happens randomly in 3D games, as well as Squeal of Death. No memory errors, not overheating, not overclocked, power above needs of pc, HDDs pass mfg. tests, APC unit recently installed, wireless PCI card recently installed. SATA drive randomly dissapears, on boot post or out of Windows (running off IDE which also had event viewer messages of "this drive disconnected unexpectedly"). I no longer know what's going on with my system, BSODs are usually 0xA, 0x50 (pagefile corrupt, fixable), 0xFE and 0x8E.

Any help is welcome, please read my notes before posting, system config. at bottom of analysis.

Thank You.

Loading Dump File [C:\Mini031812-01.dmp]

Mini Kernel Dump File: Only registers and stack trace are available

 

Symbol search path is: C:\WINDOWS\Debug Symbols

Executable search path is:

Unable to load image ntoskrnl.exe, Win32 error 0n2

WARNING: Unable to verify timestamp for ntoskrnl.exe

Windows XP Kernel Version 2600 (Service Pack 3) MP (2 procs) Free x86 compatible

Product: WinNt, suite: TerminalServer SingleUserTS

Machine Name:

Kernel base = 0x804d7000 PsLoadedModuleList = 0x805634c0

Debug session time: Sun Mar 18 15:31:17.453 2012 (GMT-7)

System Uptime: 0 days 14:38:35.169

Unable to load image ntoskrnl.exe, Win32 error 0n2

WARNING: Unable to verify timestamp for ntoskrnl.exe

Loading Kernel Symbols

...............................................................

................................................................

................

Loading User Symbols

Loading unloaded module list

....................

 

 

Bugcheck Analysis

 

 

 

Use !analyze -v to get detailed debugging information.

BugCheck 1000000A, {99bc2ff4, 2, 0, 804e7ed4}

Unable to load image Ntfs.sys, Win32 error 0n2

WARNING: Unable to verify timestamp for Ntfs.sys

Probably caused by : ntoskrnl.exe ( nt!PsReturnPoolQuota+75 )

 

Followup: MachineOwner

---------

0: kd> !analyze -v

 

 

Bugcheck Analysis

 

 

IRQL_NOT_LESS_OR_EQUAL (a)

An attempt was made to access a pageable (or completely invalid) address at an

interrupt request level (IRQL) that is too high. This is usually

caused by drivers using improper addresses.

If a kernel debugger is available get the stack backtrace.

Arguments:

Arg1: 99bc2ff4, memory referenced

Arg2: 00000002, IRQL

Arg3: 00000000, bitfield :

bit 0 : value 0 = read operation, 1 = write operation

bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)

Arg4: 804e7ed4, address which referenced memory

 

Debugging Details:

------------------

READ_ADDRESS: 99bc2ff4

CURRENT_IRQL: 2

FAULTING_IP:

nt!PsReturnPoolQuota+75

804e7ed4 8b7e0c mov edi,dword ptr [esi+0Ch]

CUSTOMER_CRASH_COUNT: 1

DEFAULT_BUCKET_ID: DRIVER_FAULT

BUGCHECK_STR: 0xA

PROCESS_NAME: seamonkey.exe

LAST_CONTROL_TRANSFER: from 80517b86 to 804e7ed4

 

STACK_TEXT:

aa8da7f8 80517b86 00000000 d71e1000 00001000 nt!PsReturnPoolQuota+0x75

aa8da878 804f8582 d71e1000 084a0ccd 00000000 nt!MiDecommitPages+0x20b

aa8da908 804f8748 88cf0098 084a0ccd aa8da94c nt!KeTerminateThread+0xf4

aa8da998 f7b56f83 88d5adc0 aa8dab64 00008000 nt!MmDeleteKernelStack+0x61

aa8dab88 f7b53c18 88ea8470 889b4c50 88fd6b58 Ntfs!NtfsCommonWrite+0x1d21

aa8dabec 804e13eb 8a6c4020 889b4c50 889b4c50 Ntfs!NtfsFsdWrite+0xf3

aa8dabec 889b4c50 8a6c4020 889b4c50 889b4c50 nt!KiTrap0D+0x4a5

WARNING: Frame IP not in any known module. Following frames may be wrong.

aa8dac98 88d7c020 889b4c50 88d5adc0 00000001 0x889b4c50

aa8dac9c 889b4c50 88d5adc0 00000001 00000001 0x88d7c020

aa8daca0 88d5adc0 00000001 00000001 883da901 0x889b4c50

aa8daca4 00000000 00000001 883da901 00000001 0x88d5adc0

 

STACK_COMMAND: kb

 

FOLLOWUP_IP:

nt!PsReturnPoolQuota+75

804e7ed4 8b7e0c mov edi,dword ptr [esi+0Ch]

SYMBOL_STACK_INDEX: 0

SYMBOL_NAME: nt!PsReturnPoolQuota+75

FOLLOWUP_NAME: MachineOwner

MODULE_NAME: nt

IMAGE_NAME: ntoskrnl.exe

DEBUG_FLR_IMAGE_TIMESTAMP: 4ea6bb78

FAILURE_BUCKET_ID: 0xA_nt!PsReturnPoolQuota+75

BUCKET_ID: 0xA_nt!PsReturnPoolQuota+75

 

Followup: MachineOwner

---------

0: kd> lmvm nt

start end module name

804d7000 80700000 nt M (pdb symbols) c:\windows\debug symbols\exe\ntoskrnl.pdb

Loaded symbol image file: ntoskrnl.exe

Image path: ntoskrnl.exe

Image name: ntoskrnl.exe

Timestamp: Tue Oct 25 06:36:56 2011 (4EA6BB78)

CheckSum: 0020FAD4

ImageSize: 00229000

Translations: 0000.04b0 0000.04e4 0409.04b0 0409.04e4

Ratnest: MGE Case, ECS PT800CE-A1.1, Intel Prescott 3.0ghz, 2GB Mushkin DDR400 RAM, HIS ATI Radeon HD 3850 AGP, CLSB Audigy SE, Trendnet RTL8169 GB NIC, D-Link DWA-552 XtremeN Wireless NIC, Seagate 80gb SATA, Seagate 400GB IDE, LG 16x DVD-RW IDE, Antec 650W PSU, PS/2 KB & Mouse, 3 case fans, 2 hd fans, 1 cpu fan, 1 chipset fan, 1 psu fan, 1 video fan.

 

Continue reading...

  • Replies 0
  • Created
  • Last Reply

Popular Days

Join the conversation

You can post now and register later. If you have an account, sign in now to post with your account.

Guest
Reply to this topic...

×   Pasted as rich text.   Paste as plain text instead

  Only 75 emoji are allowed.

×   Your link has been automatically embedded.   Display as a link instead

×   Your previous content has been restored.   Clear editor

×   You cannot paste images directly. Upload or insert images from URL.


×
×
  • Create New...