1. You are viewing our forum as a guest. For full access please Register. WindowsBBS.com is completely free, paid for by advertisers and donations.

BSOD after BootUp

Discussion in 'Windows XP' started by duffjx, 2009/10/09.

  1. 2009/10/09
    duffjx

    duffjx Inactive Thread Starter

    Joined:
    2009/10/09
    Messages:
    4
    Likes Received:
    0
    I have an HP laptop (nx6325) that gets a BSOD about 5 to 10 minutes after bootup. I have captured the minidump but I am unable to determine what exactly the problem is or how to correct it.
    Here is the minidump

    Opened log file 'c:debuglog.txt'
    kd> .sympath srv*c:symbols*http://msdl.microsoft.com/download/symbols
    Symbol search path is: srv*c:symbols*http://msdl.microsoft.com/download/symbols
    Expanded Symbol search path is: srv*c:symbols*http://msdl.microsoft.com/download/symbols
    kd> .reload;!analyze -v;r;kv;lmnt;.logclose;q
    Loading Kernel Symbols
    ...............................................................
    ................................................................
    .....................................
    Loading User Symbols
    Loading unloaded module list
    ..............
    *******************************************************************************
    * *
    * Bugcheck Analysis *
    * *
    *******************************************************************************

    INVALID_WORK_QUEUE_ITEM (96)
    This message occurs when KeRemoveQueue removes a queue entry whose flink
    or blink field is null. This is almost always called by code misusing
    worker thread work items, but any queue misuse can cause this. The rule
    is that an entry on a queue may only be inserted on the list once. When an
    item is removed from a queue, it's flink field is set to NULL. This bugcheck
    occurs when remove queue attempts to remove an entry, but the flink or blink
    field is NULL. In order to debug this problem, you need to know the queue being
    referenced.
    In an attempt to help identify the guilty driver, this bugcheck assumes the
    queue is a worker queue (ExWorkerQueue) and prints the worker routine as
    parameter 4 below.
    Arguments:
    Arg1: 855f6670, The address of the queue entry whose flink/blink field is NULL
    Arg2: 8055b17c, The address of the queue being references. Usually this is one
    of the ExWorkerQueues.
    Arg3: 8055b140, The base address of the ExWorkerQueue array. This will help determine
    if the queue in question is an ExWorkerQueue and if so, the offset from
    this parameter will isolate the queue.
    Arg4: 8056bd32, If this is an ExWorkerQueue (which it usually is), this is the address
    of the worker routine that would have been called if the work item was
    valid. This can be used to isolate the driver that is misusing the work
    queue.

    Debugging Details:
    ------------------


    WORKER_ROUTINE:
    nt!IopProcessWorkItem+0
    8056bd32 8bff mov edi,edi

    FAULTING_IP:
    nt!IopProcessWorkItem+0
    8056bd32 8bff mov edi,edi

    WORK_ITEM: 855f6670

    CUSTOMER_CRASH_COUNT: 1

    DEFAULT_BUCKET_ID: DRIVER_FAULT

    BUGCHECK_STR: 0x96

    PROCESS_NAME: System

    LAST_CONTROL_TRANSFER: from 804fb39f to 804f8cc5

    STACK_TEXT:
    ba868d2c 804fb39f 00000096 855f6670 8055b17c nt!KeBugCheckEx+0x1b
    ba868d6c 80534be8 00000001 00000001 ba868d8c nt!KeRemoveQueue+0x2e7
    ba868dac 805c61ec 855f6670 00000000 00000000 nt!ExpWorkerThread+0xd6
    ba868ddc 80541de2 80534b12 80000001 00000000 nt!PspSystemThreadStartup+0x34
    00000000 00000000 00000000 00000000 00000000 nt!KiThreadStartup+0x16


    STACK_COMMAND: .bugcheck ; kb

    FOLLOWUP_IP:
    nt!IopProcessWorkItem+0
    8056bd32 8bff mov edi,edi

    SYMBOL_NAME: nt!IopProcessWorkItem+0

    FOLLOWUP_NAME: MachineOwner

    MODULE_NAME: nt

    IMAGE_NAME: ntkrnlpa.exe

    DEBUG_FLR_IMAGE_TIMESTAMP: 498c11d3

    FAILURE_BUCKET_ID: 0x96_nt!IopProcessWorkItem+0

    BUCKET_ID: 0x96_nt!IopProcessWorkItem+0

    Followup: MachineOwner
    ---------

    eax=ffdff13c ebx=8055b17c ecx=00000000 edx=ba868d8c esi=856b0b08 edi=856b0b78
    eip=804f8cc5 esp=ba868d14 ebp=ba868d2c iopl=0 nv up ei ng nz na pe nc
    cs=0008 ss=0010 ds=0023 es=0023 fs=0030 gs=0000 efl=00000286
    nt!KeBugCheckEx+0x1b:
    804f8cc5 5d pop ebp
    ChildEBP RetAddr Args to Child
    ba868d2c 804fb39f 00000096 855f6670 8055b17c nt!KeBugCheckEx+0x1b (FPO: [5,0,0])
    ba868d6c 80534be8 00000001 00000001 ba868d8c nt!KeRemoveQueue+0x2e7 (FPO: [3,6,4])
    ba868dac 805c61ec 855f6670 00000000 00000000 nt!ExpWorkerThread+0xd6 (FPO: [1,8,0])
    ba868ddc 80541de2 80534b12 80000001 00000000 nt!PspSystemThreadStartup+0x34 (FPO: [Non-Fpo])
    00000000 00000000 00000000 00000000 00000000 nt!KiThreadStartup+0x16
    start end module name
    804d7000 806cf680 nt ntkrnlpa.exe Fri Feb 06 05:32:51 2009 (498C11D3)
    806d0000 806e3d00 hal halacpi.dll Sun Apr 13 14:31:27 2008 (4802517F)
    ba3a4000 ba3b7180 NAVENG NAVENG.SYS Sat Aug 22 01:31:12 2009 (4A8F82A0)
    ba3b8000 ba4f9800 NAVEX15 NAVEX15.SYS Sat Aug 22 01:37:19 2009 (4A8F840F)
    ba6da000 ba704180 kmixer kmixer.sys Sun Apr 13 14:45:07 2008 (480254B3)
    baa25000 baa65a80 HTTP HTTP.sys Sun Apr 13 14:53:48 2008 (480256BC)
    bf800000 bf9c2f80 win32k win32k.sys Fri Apr 17 08:26:26 2009 (49E87572)
    bf9c3000 bf9d4600 dxg dxg.sys Sun Apr 13 14:38:27 2008 (48025323)
    bf9d5000 bfa18000 ati2dvag ati2dvag.dll Thu Apr 27 09:47:07 2006 (4450CB5B)
    bfa18000 bfa5d000 ati2cqag ati2cqag.dll Thu Apr 27 09:05:56 2006 (4450C1B4)
    bfa5d000 bfa93000 atikvmag atikvmag.dll Thu Apr 27 09:12:02 2006 (4450C322)
    bfa93000 bfd248a0 ati3duag ati3duag.dll Thu Apr 27 09:31:29 2006 (4450C7B1)
    bfd25000 bfe7cc00 ativvaxx ativvaxx.dll Thu Apr 27 09:25:14 2006 (4450C63A)
    bffa0000 bffe5c00 ATMFD ATMFD.DLL Sun Apr 13 20:09:55 2008 (4802A0D3)
    eb120000 eb143380 WpsHelper WpsHelper.sys Mon Mar 09 23:18:06 2009 (49B5DBEE)
    eb464000 eb4793c0 DLAUDF_M DLAUDF_M.SYS Wed Aug 31 14:32:43 2005 (4315F7CB)
    eb47a000 eb491040 DLAUDFAM DLAUDFAM.SYS Wed Aug 31 14:32:57 2005 (4315F7D9)
    eb492000 eb4a71c0 DLAIFS_M DLAIFS_M.SYS Wed Aug 31 14:32:36 2005 (4315F7C4)
    eb4bc000 eb4bf900 ndisuio ndisuio.sys Sun Apr 13 14:55:57 2008 (4802573D)
    eb508000 eb50b920 DLAOPIOM DLAOPIOM.SYS Wed Aug 31 14:33:55 2005 (4315F813)
    ed6e8000 ed6ff900 dump_atapi dump_atapi.sys Sun Apr 13 14:40:29 2008 (4802539D)
    ed700000 ed71d000 EraserUtilRebootDrv EraserUtilRebootDrv.sys Mon Aug 17 19:05:39 2009 (4A89E243)
    ed71d000 ed77b000 eeCtrl eeCtrl.sys Mon Aug 17 19:05:39 2009 (4A89E243)
    ed77b000 ed7ea280 mrxsmb mrxsmb.sys Fri Oct 24 07:21:07 2008 (4901AFA3)
    ed7eb000 ed815e80 rdbss rdbss.sys Sun Apr 13 15:28:38 2008 (48025EE6)
    ed83e000 ed8a8000 SPBBCDrv SPBBCDrv.sys Fri Sep 05 01:46:11 2008 (48C0C7A3)
    ed8a8000 ed8c9d00 afd afd.sys Thu Aug 14 06:04:35 2008 (48A40333)
    ed8ca000 ed8f1c00 netbt netbt.sys Sun Apr 13 15:20:59 2008 (48025D1B)
    ed8f2000 ed91f200 SYMTDI SYMTDI.SYS Tue Aug 19 16:17:48 2008 (48AB2A6C)
    ed920000 ed945500 ipnat ipnat.sys Sun Apr 13 14:57:10 2008 (48025786)
    ed946000 ed99e480 tcpip tcpip.sys Fri Jun 20 07:51:09 2008 (485B99AD)
    ed99f000 ed9b1600 ipsec ipsec.sys Sun Apr 13 15:19:42 2008 (48025CCE)
    ed9d2000 ed9f1d80 ATSwpDrv ATSwpDrv.sys Thu Mar 30 15:39:46 2006 (442C3402)
    eda06000 eda2b000 SYMEVENT SYMEVENT.SYS Mon Jan 14 18:29:24 2008 (478BF054)
    edb6d000 edbb7000 SRTSP SRTSP.SYS Mon Feb 23 21:47:54 2009 (49A35FDA)
    edbb7000 edc66680 HSF_CNXT HSF_CNXT.sys Mon Aug 22 19:06:09 2005 (430A5A61)
    edc67000 edd63b00 HSF_DPV HSF_DPV.sys Mon Aug 22 19:06:56 2005 (430A5A90)
    edd64000 edd95380 HSFHWAZL HSFHWAZL.sys Mon Aug 22 19:06:13 2005 (430A5A65)
    edd96000 eddad300 AEAudio AEAudio.sys Fri Jul 13 12:26:10 2007 (4697A7A2)
    eddae000 eddd1a80 portcls portcls.sys Sun Apr 13 15:19:40 2008 (48025CCC)
    eddd2000 ede1b000 ADIHdAud ADIHdAud.sys Mon Oct 01 13:27:39 2007 (47012E0B)
    ede5b000 ede69b00 drmk drmk.sys Sun Apr 13 14:45:12 2008 (480254B8)
    ede7b000 ede845a0 DRVNDDM DRVNDDM.SYS Fri Aug 12 16:21:43 2005 (42FD04D7)
    ede8b000 ede9a900 Cdfs Cdfs.SYS Sun Apr 13 15:14:21 2008 (48025B8D)
    f5f53000 f5f55f80 mouhid mouhid.sys Fri Aug 17 16:47:57 2001 (3B7D82FD)
    f5f63000 f5f65280 rasacd rasacd.sys Fri Aug 17 16:55:39 2001 (3B7D84CB)
    f5f6b000 f5fc8f00 update update.sys Sun Apr 13 14:39:46 2008 (48025372)
    f5fc9000 f5fff000 teefer2 teefer2.sys Tue Oct 14 15:24:04 2008 (48F4F1D4)
    f5fff000 f602ee80 rdpdr rdpdr.sys Sun Apr 13 14:32:50 2008 (480251D2)
    f605c000 f6088180 mrxdav mrxdav.sys Sun Apr 13 14:32:42 2008 (480251CA)
    f6091000 f60a1e00 psched psched.sys Sun Apr 13 14:56:36 2008 (48025764)
    f60a2000 f60b8580 ndiswan ndiswan.sys Sun Apr 13 15:20:41 2008 (48025D09)
    f60b9000 f61fd140 btkrnl btkrnl.sys Wed Feb 15 18:56:58 2006 (43F3BFCA)
    f61fe000 f6211580 sdbus sdbus.sys Sun Apr 13 14:36:44 2008 (480252BC)
    f6212000 f6240000 tifm21 tifm21.sys Thu Jul 06 14:23:30 2006 (44AD5522)
    f6240000 f6262d80 b57xp32 b57xp32.sys Mon Oct 17 18:31:57 2005 (4354265D)
    f6263000 f6292220 SynTP SynTP.sys Fri Mar 31 19:41:41 2006 (442DBE35)
    f6293000 f62a6900 parport parport.sys Sun Apr 13 14:40:09 2008 (48025389)
    f62a7000 f62cf000 HDAudBus HDAudBus.sys Thu May 26 11:46:29 2005 (4295EF55)
    f62cf000 f62f1700 ks ks.sys Sun Apr 13 15:16:34 2008 (48025C12)
    f62f2000 f6315200 USBPORT USBPORT.SYS Sun Apr 13 14:45:34 2008 (480254CE)
    f6316000 f63dec00 bcmwl5 bcmwl5.sys Wed Jul 11 21:42:17 2007 (469586F9)
    f63df000 f63f2f00 VIDEOPRT VIDEOPRT.SYS Sun Apr 13 14:44:39 2008 (48025497)
    f63f3000 f657a000 ati2mtag ati2mtag.sys Thu Apr 27 09:46:49 2006 (4450CB49)
    f65e9000 f65f7880 usbhub usbhub.sys Sun Apr 13 14:45:36 2008 (480254D0)
    f6619000 f6623e00 Fips Fips.SYS Sun Apr 13 14:33:27 2008 (480251F7)
    f6629000 f6632e80 NDProxy NDProxy.SYS Sun Apr 13 14:57:28 2008 (48025798)
    f6649000 f6657000 wpsdrvnt wpsdrvnt.sys Wed May 13 00:18:41 2009 (4A0A4A21)
    f6669000 f6672f00 termdd termdd.sys Sun Apr 13 14:38:36 2008 (4802532C)
    f6b45000 f6b59480 wdmaud wdmaud.sys Sun Apr 13 15:17:18 2008 (48025C3E)
    f6baa000 f6bb8d80 sysaudio sysaudio.sys Sun Apr 13 15:15:55 2008 (48025BEB)
    f6f92000 f6fc3980 RMCast RMCast.sys Thu May 08 10:02:52 2008 (4823080C)
    f70b4000 f70ca980 mqac mqac.sys Sun Apr 13 14:39:42 2008 (4802536E)
    f70cb000 f711c880 srv srv.sys Thu Dec 11 05:57:07 2008 (4940F203)
    f7239000 f723be40 mdmxsdk mdmxsdk.sys Wed Mar 17 15:04:10 2004 (4058A12A)
    f731d000 f7320900 kbdhid kbdhid.sys Sun Apr 13 14:39:47 2008 (48025373)
    f7321000 f7323900 Dxapi Dxapi.sys Fri Aug 17 16:53:19 2001 (3B7D843F)
    f7339000 f733cc80 mssmbios mssmbios.sys Sun Apr 13 14:36:45 2008 (480252BD)
    f736e000 f7387b80 Mup Mup.sys Sun Apr 13 15:17:05 2008 (48025C31)
    f7388000 f73b4980 NDIS NDIS.sys Sun Apr 13 15:20:35 2008 (48025D03)
    f73b5000 f7441600 Ntfs Ntfs.sys Sun Apr 13 15:15:49 2008 (48025BE5)
    f7442000 f7458b00 KSecDD KSecDD.sys Wed Jun 24 07:18:40 2009 (4A420B90)
    f7459000 f746e240 DRVMCDB DRVMCDB.SYS Tue Aug 30 17:12:49 2005 (4314CBD1)
    f746f000 f7480f00 sr sr.sys Sun Apr 13 14:36:50 2008 (480252C2)
    f7481000 f74a0b00 fltmgr fltmgr.sys Sun Apr 13 14:32:58 2008 (480251DA)
    f74a1000 f74b8900 atapi atapi.sys Sun Apr 13 14:40:29 2008 (4802539D)
    f74b9000 f74de700 dmio dmio.sys Sun Apr 13 14:44:45 2008 (4802549D)
    f74df000 f74fd880 ftdisk ftdisk.sys Fri Aug 17 16:52:41 2001 (3B7D8419)
    f74fe000 f751b580 pcmcia pcmcia.sys Sun Apr 13 14:36:41 2008 (480252B9)
    f751c000 f752ca80 pci pci.sys Sun Apr 13 14:36:43 2008 (480252BB)
    f752d000 f755ad80 ACPI ACPI.sys Sun Apr 13 14:36:33 2008 (480252B1)
    f765c000 f7665180 isapnp isapnp.sys Sun Apr 13 14:36:40 2008 (480252B8)
    f766c000 f767b100 ohci1394 ohci1394.sys Sun Apr 13 14:46:18 2008 (480254FA)
    f767c000 f7689080 1394BUS 1394BUS.SYS Sun Apr 13 14:46:18 2008 (480254FA)
    f768c000 f7696580 MountMgr MountMgr.sys Sun Apr 13 14:39:45 2008 (48025371)
    f769c000 f76a8c80 VolSnap VolSnap.sys Sun Apr 13 14:41:00 2008 (480253BC)
    f76ac000 f76b4e00 disk disk.sys Sun Apr 13 14:40:46 2008 (480253AE)
    f76bc000 f76c8180 CLASSPNP CLASSPNP.SYS Sun Apr 13 15:16:21 2008 (48025C05)
    f76cc000 f76d4b80 PxHelp20 PxHelp20.sys Fri Feb 02 16:23:57 2007 (45C3ABED)
    f76fc000 f770ad80 arp1394 arp1394.sys Sun Apr 13 14:51:22 2008 (4802562A)
    f770c000 f771a000 AmdK8 AmdK8.sys Sun Jul 02 01:39:38 2006 (44A75C1A)
    f771c000 f7726480 imapi imapi.sys Sun Apr 13 14:40:57 2008 (480253B9)
    f772c000 f773b600 cdrom cdrom.sys Sun Apr 13 14:40:45 2008 (480253AD)
    f773c000 f774a100 redbook redbook.sys Sun Apr 13 14:40:27 2008 (4802539B)
    f774c000 f7754e00 IFXTPM IFXTPM.SYS Mon Oct 10 09:46:20 2005 (434A70AC)
    f775c000 f7768d00 i8042prt i8042prt.sys Sun Apr 13 15:17:59 2008 (48025C67)
    f776c000 f777b180 nic1394 nic1394.sys Sun Apr 13 14:51:22 2008 (4802562A)
    f777c000 f7785000 HIDCLASS HIDCLASS.SYS Sun Apr 13 14:45:25 2008 (480254C5)
    f778c000 f7798880 rasl2tp rasl2tp.sys Sun Apr 13 15:19:43 2008 (48025CCF)
    f779c000 f77a6200 raspppoe raspppoe.sys Sun Apr 13 14:57:31 2008 (4802579B)
    f77ac000 f77b7d00 raspptp raspptp.sys Sun Apr 13 15:19:47 2008 (48025CD3)
    f77bc000 f77c4900 msgpc msgpc.sys Sun Apr 13 14:56:32 2008 (48025760)
    f785c000 f7864700 wanarp wanarp.sys Sun Apr 13 14:57:20 2008 (48025790)
    f786c000 f7875100 SRTSPX SRTSPX.SYS Mon Feb 23 21:50:26 2009 (49A36072)
    f789c000 f78a4780 netbios netbios.sys Sun Apr 13 14:56:01 2008 (48025741)
    f78dc000 f78e2180 PCIIDEX PCIIDEX.SYS Sun Apr 13 14:40:29 2008 (4802539D)
    f78e4000 f78e8d00 PartMgr PartMgr.sys Sun Apr 13 14:40:48 2008 (480253B0)
    f7974000 f7979860 DLARTL_N DLARTL_N.SYS Thu Aug 25 15:16:15 2005 (430E18FF)
    f797c000 f7981200 vga vga.sys Sun Apr 13 14:44:40 2008 (48025498)
    f7984000 f7988a80 Msfs Msfs.SYS Sun Apr 13 14:32:38 2008 (480251C6)
    f798c000 f7993880 Npfs Npfs.SYS Sun Apr 13 14:32:38 2008 (480251C6)
    f79a4000 f79a8500 watchdog watchdog.sys Sun Apr 13 14:44:59 2008 (480254AB)
    f79ac000 f79b0300 usbohci usbohci.sys Sun Apr 13 14:45:34 2008 (480254CE)
    f79b4000 f79bb600 usbehci usbehci.sys Sun Apr 13 14:45:34 2008 (480254CE)
    f79bc000 f79c2000 kbdclass kbdclass.sys Sun Apr 13 14:39:46 2008 (48025372)
    f79c4000 f79c9a00 mouclass mouclass.sys Sun Apr 13 14:39:47 2008 (48025373)
    f79d4000 f79da180 HIDPARSE HIDPARSE.SYS Sun Apr 13 14:45:22 2008 (480254C2)
    f79dc000 f79e0a80 TDI TDI.SYS Sun Apr 13 15:00:04 2008 (48025834)
    f79e4000 f79e8580 ptilink ptilink.sys Fri Aug 17 16:49:53 2001 (3B7D8371)
    f79ec000 f79f0080 raspti raspti.sys Fri Aug 17 16:55:32 2001 (3B7D84C4)
    f7a0c000 f7a13580 Modem Modem.SYS Sun Apr 13 15:00:18 2008 (48025842)
    f7a14000 f7a1b980 psd psd.sys Tue Nov 29 10:33:49 2005 (438C74DD)
    f7a24000 f7a2bd80 usbccgp usbccgp.sys Sun Apr 13 14:45:38 2008 (480254D2)
    f7a4c000 f7a523e0 DLABOIOM DLABOIOM.SYS Wed Aug 31 14:33:12 2005 (4315F7E8)
    f7a6c000 f7a6f000 BOOTVID BOOTVID.dll Fri Aug 17 16:49:09 2001 (3B7D8345)
    f7a70000 f7a72800 compbatt compbatt.sys Sun Apr 13 14:36:36 2008 (480252B4)
    f7a74000 f7a77780 BATTC BATTC.SYS Sun Apr 13 14:36:32 2008 (480252B0)
    f7a78000 f7a7ad80 ACPIEC ACPIEC.sys Fri Aug 17 16:57:55 2001 (3B7D8553)
    f7b28000 f7b2a880 hidusb hidusb.sys Sun Apr 13 14:45:27 2008 (480254C7)
    f7b30000 f7b32480 cpqbttn cpqbttn.sys Mon Sep 19 15:24:09 2005 (432F1059)
    f7b34000 f7b37680 CmBatt CmBatt.sys Sun Apr 13 14:36:36 2008 (480252B4)
    f7b38000 f7b3a280 wmiacpi wmiacpi.sys Sun Apr 13 14:36:37 2008 (480252B5)
    f7b3c000 f7b3e780 ndistapi ndistapi.sys Sun Apr 13 14:57:27 2008 (48025797)
    f7b5c000 f7b5db80 kdcom kdcom.dll Fri Aug 17 16:49:10 2001 (3B7D8346)
    f7b5e000 f7b5f100 WMILIB WMILIB.SYS Fri Aug 17 17:07:23 2001 (3B7D878B)
    f7b60000 f7b61580 intelide intelide.sys Sun Apr 13 14:40:29 2008 (4802539D)
    f7b62000 f7b63500 viaide viaide.sys Sun Apr 13 14:40:30 2008 (4802539E)
    f7b64000 f7b65480 aliide aliide.sys Fri Aug 17 16:51:54 2001 (3B7D83EA)
    f7b66000 f7b67700 dmload dmload.sys Fri Aug 17 16:58:15 2001 (3B7D8567)
    f7b6c000 f7b6d080 Beep Beep.SYS Fri Aug 17 16:47:33 2001 (3B7D82E5)
    f7b6e000 f7b6f080 mnmdd mnmdd.SYS Fri Aug 17 16:57:28 2001 (3B7D8538)
    f7b70000 f7b71080 RDPCDD RDPCDD.sys Fri Aug 17 16:46:56 2001 (3B7D82C0)
    f7b74000 f7b75e80 eabfiltr eabfiltr.sys Mon Sep 19 15:23:51 2005 (432F1047)
    f7b78000 f7b79100 dump_WMILIB dump_WMILIB.SYS Fri Aug 17 17:07:23 2001 (3B7D878B)
    f7b7e000 f7b7f5c0 DLACDBHM DLACDBHM.SYS Thu Aug 25 15:16:50 2005 (430E1922)
    f7b82000 f7b83280 USBD USBD.SYS Fri Aug 17 17:02:58 2001 (3B7D8682)
    f7b8a000 f7b8b100 swenum swenum.sys Sun Apr 13 14:39:52 2008 (48025378)
    f7ba0000 f7ba18a0 DLAPoolM DLAPoolM.SYS Wed Aug 31 14:32:37 2005 (4315F7C5)
    f7c22000 f7c23f00 Fs_Rec Fs_Rec.SYS Fri Aug 17 16:49:37 2001 (3B7D8361)
    f7c24000 f7c24d00 pciide pciide.sys Fri Aug 17 16:51:49 2001 (3B7D83E5)
    f7c25000 f7c25d80 OPRGHDLR OPRGHDLR.SYS Fri Aug 17 16:57:55 2001 (3B7D8553)
    f7c8f000 f7c8f980 DLADResN DLADResN.SYS Wed Aug 31 14:35:39 2005 (4315F87B)
    f7c91000 f7c91c00 audstub audstub.sys Fri Aug 17 16:59:40 2001 (3B7D85BC)
    f7ce2000 f7ce2b80 Null Null.SYS Fri Aug 17 16:47:39 2001 (3B7D82EB)
    f7d6f000 f7d6fd00 dxgthk dxgthk.sys Fri Aug 17 16:53:12 2001 (3B7D8438)

    Unloaded modules:
    ba3a4000 ba3b8000 NAVENG.SYS
    Timestamp: unavailable (00000000)
    Checksum: 00000000
    ba3b8000 ba4fa000 NAVEX15.SYS
    Timestamp: unavailable (00000000)
    Checksum: 00000000
    ed9f2000 eda06000 NAVENG.SYS
    Timestamp: unavailable (00000000)
    Checksum: 00000000
    eda2b000 edb6d000 NAVEX15.SYS
    Timestamp: unavailable (00000000)
    Checksum: 00000000
    f6af7000 f6b22000 kmixer.sys
    Timestamp: unavailable (00000000)
    Checksum: 00000000
    f7d8e000 f7d8f000 drmkaud.sys
    Timestamp: unavailable (00000000)
    Checksum: 00000000
    eb40c000 eb419000 DMusic.sys
    Timestamp: unavailable (00000000)
    Checksum: 00000000
    f702c000 f703a000 swmidi.sys
    Timestamp: unavailable (00000000)
    Checksum: 00000000
    f6b22000 f6b45000 aec.sys
    Timestamp: unavailable (00000000)
    Checksum: 00000000
    f7c08000 f7c0a000 splitter.sys
    Timestamp: unavailable (00000000)
    Checksum: 00000000
    f78bc000 f78c5000 processr.sys
    Timestamp: unavailable (00000000)
    Checksum: 00000000
    f78ac000 f78bc000 serial.sys
    Timestamp: unavailable (00000000)
    Checksum: 00000000
    f796c000 f7971000 Cdaudio.SYS
    Timestamp: unavailable (00000000)
    Checksum: 00000000
    f7b20000 f7b23000 Sfloppy.SYS
    Timestamp: unavailable (00000000)
    Checksum: 00000000
    Closing open log file c:debuglog.txt

    Any help would be appreciated.

    Thanks
     
  2. 2009/10/09
    Steve R Jones

    Steve R Jones SuperGeek Staff

    Joined:
    2001/12/30
    Messages:
    12,317
    Likes Received:
    252
    Welcome to WindowsBBS;)

    Reading dump files reqires a skill I don't have...But Googleing the Stop Code is;)

    Introduction to Stop Errors

    "Stop errors in a nutshell are errors that are serious enough to cause Windows to stop. They are similar to the blue screen errors that were present on Windows 9x, however there is no option to try and resume the session in a Windows NT Stop Error (Windows 2000 and all XP members included). "

    Continued:

    http://mvps.org/marksxp/WindowsXP/bsod.php



    Go here to search for the error message:

    http://support.microsoft.com/default.aspx?scid=fh;EN-US;kbhowto&sd=GN&ln=EN-US&FR=0
     

  3. to hide this advert.

  4. 2009/10/09
    duffjx

    duffjx Inactive Thread Starter

    Joined:
    2009/10/09
    Messages:
    4
    Likes Received:
    0
    Thanks for the links, some good info there.
    It seems my problem is coming from the ntkrnl.exe instead of a driver.
    No idea how you go about correcting that issue!
     
  5. 2009/10/10
    Arie

    Arie Administrator Administrator Staff

    Joined:
    2001/12/27
    Messages:
    15,174
    Likes Received:
    412
    Bugcheck code 96 is quite rare.

    See if you can post one or two more dumps.

    Follow these instructions to post a Dump Data Log.
     
    Arie,
    #4
  6. 2009/10/13
    duffjx

    duffjx Inactive Thread Starter

    Joined:
    2009/10/09
    Messages:
    4
    Likes Received:
    0
    Here are 2 more dumps from consecutive days. This happens to the user everyday when he starts his computer.

    Dump#1:


    Microsoft (R) Windows Debugger Version 6.11.0001.404 X86
    Copyright (c) Microsoft Corporation. All rights reserved.


    Loading Dump File [C:\Temp\Trevor dump files\Mini100709-01.dmp]
    Mini Kernel Dump File: Only registers and stack trace are available

    Symbol search path is: C:\WINDOWS\Symbols
    Executable search path is:
    Unable to load image ntoskrnl.exe, Win32 error 0n2
    *** WARNING: Unable to verify timestamp for ntoskrnl.exe
    Windows XP Kernel Version 2600 (Service Pack 3) UP Free x86 compatible
    Product: WinNt, suite: TerminalServer SingleUserTS
    Machine Name:
    Kernel base = 0x804d7000 PsLoadedModuleList = 0x80554040
    Debug session time: Wed Oct 7 09:13:54.083 2009 (GMT-4)
    System Uptime: 0 days 0:07:28.087
    Unable to load image ntoskrnl.exe, Win32 error 0n2
    *** WARNING: Unable to verify timestamp for ntoskrnl.exe
    Loading Kernel Symbols
    ...............................................................
    ................................................................
    .....................................
    Loading User Symbols
    Loading unloaded module list
    ............
    *******************************************************************************
    * *
    * Bugcheck Analysis *
    * *
    *******************************************************************************

    Use !analyze -v to get detailed debugging information.

    BugCheck 96, {84f9c860, 8055b17c, 8055b140, 8056bd32}

    Probably caused by : ntoskrnl.exe ( nt!NtSetIoCompletion+17 )

    Followup: MachineOwner
    ---------

    kd> !analyze -v
    *******************************************************************************
    * *
    * Bugcheck Analysis *
    * *
    *******************************************************************************

    INVALID_WORK_QUEUE_ITEM (96)
    This message occurs when KeRemoveQueue removes a queue entry whose flink
    or blink field is null. This is almost always called by code misusing
    worker thread work items, but any queue misuse can cause this. The rule
    is that an entry on a queue may only be inserted on the list once. When an
    item is removed from a queue, it's flink field is set to NULL. This bugcheck
    occurs when remove queue attempts to remove an entry, but the flink or blink
    field is NULL. In order to debug this problem, you need to know the queue being
    referenced.
    In an attempt to help identify the guilty driver, this bugcheck assumes the
    queue is a worker queue (ExWorkerQueue) and prints the worker routine as
    parameter 4 below.
    Arguments:
    Arg1: 84f9c860, The address of the queue entry whose flink/blink field is NULL
    Arg2: 8055b17c, The address of the queue being references. Usually this is one
    of the ExWorkerQueues.
    Arg3: 8055b140, The base address of the ExWorkerQueue array. This will help determine
    if the queue in question is an ExWorkerQueue and if so, the offset from
    this parameter will isolate the queue.
    Arg4: 8056bd32, If this is an ExWorkerQueue (which it usually is), this is the address
    of the worker routine that would have been called if the work item was
    valid. This can be used to isolate the driver that is misusing the work
    queue.

    Debugging Details:
    ------------------


    WORKER_ROUTINE:
    nt!NtSetIoCompletion+17
    8056bd32 8bff mov edi,edi

    FAULTING_IP:
    nt!NtSetIoCompletion+17
    8056bd32 8bff mov edi,edi

    WORK_ITEM: 84f9c860

    CUSTOMER_CRASH_COUNT: 1

    DEFAULT_BUCKET_ID: DRIVER_FAULT

    BUGCHECK_STR: 0x96

    PROCESS_NAME: System

    LAST_CONTROL_TRANSFER: from 804fb39f to 804f8cc5

    STACK_TEXT:
    f7256d2c 804fb39f 00000096 84f9c860 8055b17c nt!KeContextToKframes+0x1eb
    f7256d6c 80534be7 00000001 8304dd01 f7256d8c nt!ExTraceAllTables+0x5a
    f7256d70 00000000 8304dd01 f7256d8c 00000000 nt!ZwAcceptConnectPort


    STACK_COMMAND: .bugcheck ; kb

    FOLLOWUP_IP:
    nt!NtSetIoCompletion+17
    8056bd32 8bff mov edi,edi

    SYMBOL_NAME: nt!NtSetIoCompletion+17

    FOLLOWUP_NAME: MachineOwner

    MODULE_NAME: nt

    IMAGE_NAME: ntoskrnl.exe

    DEBUG_FLR_IMAGE_TIMESTAMP: 498c11d3

    FAILURE_BUCKET_ID: 0x96_nt!NtSetIoCompletion+17

    BUCKET_ID: 0x96_nt!NtSetIoCompletion+17

    Followup: MachineOwner
    ---------

    Dump#2:


    Microsoft (R) Windows Debugger Version 6.11.0001.404 X86
    Copyright (c) Microsoft Corporation. All rights reserved.


    Loading Dump File [C:\Temp\Trevor dump files\Mini100609-01.dmp]
    Mini Kernel Dump File: Only registers and stack trace are available

    Symbol search path is: C:\WINDOWS\Symbols
    Executable search path is:
    Unable to load image ntoskrnl.exe, Win32 error 0n2
    *** WARNING: Unable to verify timestamp for ntoskrnl.exe
    Windows XP Kernel Version 2600 (Service Pack 3) UP Free x86 compatible
    Product: WinNt, suite: TerminalServer SingleUserTS
    Machine Name:
    Kernel base = 0x804d7000 PsLoadedModuleList = 0x80554040
    Debug session time: Tue Oct 6 09:15:44.405 2009 (GMT-4)
    System Uptime: 0 days 0:18:03.195
    Unable to load image ntoskrnl.exe, Win32 error 0n2
    *** WARNING: Unable to verify timestamp for ntoskrnl.exe
    Loading Kernel Symbols
    ...............................................................
    ................................................................
    .....................................
    Loading User Symbols
    Loading unloaded module list
    ...............
    *******************************************************************************
    * *
    * Bugcheck Analysis *
    * *
    *******************************************************************************

    Use !analyze -v to get detailed debugging information.

    BugCheck 96, {85474b20, 8055b17c, 8055b140, 8056bd32}

    Probably caused by : ntoskrnl.exe ( nt!NtSetIoCompletion+17 )

    Followup: MachineOwner
    ---------

    kd> !analyze -v
    *******************************************************************************
    * *
    * Bugcheck Analysis *
    * *
    *******************************************************************************

    INVALID_WORK_QUEUE_ITEM (96)
    This message occurs when KeRemoveQueue removes a queue entry whose flink
    or blink field is null. This is almost always called by code misusing
    worker thread work items, but any queue misuse can cause this. The rule
    is that an entry on a queue may only be inserted on the list once. When an
    item is removed from a queue, it's flink field is set to NULL. This bugcheck
    occurs when remove queue attempts to remove an entry, but the flink or blink
    field is NULL. In order to debug this problem, you need to know the queue being
    referenced.
    In an attempt to help identify the guilty driver, this bugcheck assumes the
    queue is a worker queue (ExWorkerQueue) and prints the worker routine as
    parameter 4 below.
    Arguments:
    Arg1: 85474b20, The address of the queue entry whose flink/blink field is NULL
    Arg2: 8055b17c, The address of the queue being references. Usually this is one
    of the ExWorkerQueues.
    Arg3: 8055b140, The base address of the ExWorkerQueue array. This will help determine
    if the queue in question is an ExWorkerQueue and if so, the offset from
    this parameter will isolate the queue.
    Arg4: 8056bd32, If this is an ExWorkerQueue (which it usually is), this is the address
    of the worker routine that would have been called if the work item was
    valid. This can be used to isolate the driver that is misusing the work
    queue.

    Debugging Details:
    ------------------


    WORKER_ROUTINE:
    nt!NtSetIoCompletion+17
    8056bd32 8bff mov edi,edi

    FAULTING_IP:
    nt!NtSetIoCompletion+17
    8056bd32 8bff mov edi,edi

    WORK_ITEM: 85474b20

    CUSTOMER_CRASH_COUNT: 1

    DEFAULT_BUCKET_ID: DRIVER_FAULT

    BUGCHECK_STR: 0x96

    PROCESS_NAME: System

    LAST_CONTROL_TRANSFER: from 804fb39f to 804f8cc5

    STACK_TEXT:
    b8976d2c 804fb39f 00000096 85474b20 8055b17c nt!KeContextToKframes+0x1eb
    b8976d6c 80534be7 00000001 00000001 b8976d8c nt!ExTraceAllTables+0x5a
    b8976d70 00000000 00000001 b8976d8c 00000000 nt!ZwAcceptConnectPort


    STACK_COMMAND: .bugcheck ; kb

    FOLLOWUP_IP:
    nt!NtSetIoCompletion+17
    8056bd32 8bff mov edi,edi

    SYMBOL_NAME: nt!NtSetIoCompletion+17

    FOLLOWUP_NAME: MachineOwner

    MODULE_NAME: nt

    IMAGE_NAME: ntoskrnl.exe

    DEBUG_FLR_IMAGE_TIMESTAMP: 498c11d3

    FAILURE_BUCKET_ID: 0x96_nt!NtSetIoCompletion+17

    BUCKET_ID: 0x96_nt!NtSetIoCompletion+17

    Followup: MachineOwner
    ---------

    Any suggestions?
     
  7. 2009/10/13
    Arie

    Arie Administrator Administrator Staff

    Joined:
    2001/12/27
    Messages:
    15,174
    Likes Received:
    412
    As per Bug Check 0x96: INVALID_WORK_QUEUE_ITEM

    In your logs the 4rth parameter is always 8056bd32. The only thing I can suggest right now is updating all your drivers.

    I'm not sure if running drive verifier would 'catch' the offending driver in this case.
     
    Arie,
    #6
  8. 2009/10/14
    duffjx

    duffjx Inactive Thread Starter

    Joined:
    2009/10/09
    Messages:
    4
    Likes Received:
    0
    The fourth parameter does point to the memory location of the workerqueue, which happens to be the NT kernel. If it pointed to a driver this would be alot easier. I have updated all the drivers to their current version, the BIOS has been updated as well. Still having the same issues.
    Thanks for your suggestions.
     
  9. 2009/10/17
    Arie

    Arie Administrator Administrator Staff

    Joined:
    2001/12/27
    Messages:
    15,174
    Likes Received:
    412
    Probably the best thing to do is to go to Microsoft Support Services, and select an option to "open" a support request.

    You can use the log file (debuglog.txt) generated to supply the needed information to start your support request.
     
    Arie,
    #8

Share This Page

  1. This site uses cookies to help personalise content, tailor your experience and to keep you logged in if you register.
    By continuing to use this site, you are consenting to our use of cookies.