1. You are viewing our forum as a guest. For full access please Register. WindowsBBS.com is completely free, paid for by advertisers and donations.

DRIVER_IRQL_NOT_LESS_OR_EQUAL Blue Screen [DUMP DATA]

Discussion in 'Windows XP' started by st8800, 2006/02/20.

  1. 2006/02/20
    st8800

    st8800 Inactive Thread Starter

    Joined:
    2006/02/20
    Messages:
    3
    Likes Received:
    0
    Notice you have a great forum here. Hope you can help me out here.

    Been getting this Blue screen more than 1 once a day now. Here are some info I managed to get from my limited knowledge with the Window Debugger:

    -----------------

    Microsoft (R) Windows Debugger Version 6.6.0003.5
    Copyright (c) Microsoft Corporation. All rights reserved.

    Loading Dump File [C:\WINDOWS\Minidump\Mini022006-02.dmp]
    Mini Kernel Dump File: Only registers and stack trace are available

    Symbol search path is: SRV*c:\local cache*http://msdl.microsoft.com/download/symbols
    Executable search path is:
    Windows XP Kernel Version 2600 (Service Pack 2) UP Free x86 compatible
    Product: WinNt
    Built by: 2600.xpsp_sp2_gdr.050301-1519
    Kernel base = 0x804d7000 PsLoadedModuleList = 0x8055a420
    Debug session time: Mon Feb 20 18:44:53.859 2006 (GMT+8)
    System Uptime: 0 days 0:52:14.433
    Loading Kernel Symbols
    ..................................................................................................................
    Loading User Symbols
    Loading unloaded module list
    ...............
    kd> !analyze "“v
    *******************************************************************************
    * *
    * Bugcheck Analysis *
    * *
    *******************************************************************************

    Use !analyze -v to get detailed debugging information.

    BugCheck D1, {0, 2, 1, 804d0044}

    Probably caused by : afd.sys ( afd!AfdPoll+20e )

    Followup: MachineOwner
    ---------

    kd> !analyze -v
    *******************************************************************************
    * *
    * Bugcheck Analysis *
    * *
    *******************************************************************************

    DRIVER_IRQL_NOT_LESS_OR_EQUAL (d1)
    An attempt was made to access a pageable (or completely invalid) address at an
    interrupt request level (IRQL) that is too high. This is usually
    caused by drivers using improper addresses.
    If kernel debugger is available get stack backtrace.
    Arguments:
    Arg1: 00000000, memory referenced
    Arg2: 00000002, IRQL
    Arg3: 00000001, value 0 = read operation, 1 = write operation
    Arg4: 804d0044, address which referenced memory

    Debugging Details:
    ------------------


    WRITE_ADDRESS: 00000000

    CURRENT_IRQL: 2

    FAULTING_IP:
    +ffffffff804d0044
    804d0044 0000 add [eax],al

    CUSTOMER_CRASH_COUNT: 2

    DEFAULT_BUCKET_ID: DRIVER_FAULT

    BUGCHECK_STR: 0xD1

    LAST_CONTROL_TRANSFER: from 804d0044 to 804e187f

    STACK_TEXT:
    b984bb04 804d0044 badb0d00 b984bb88 f59237e0 nt!KiTrap0E+0x233
    WARNING: Frame IP not in any known module. Following frames may be wrong.
    b984bb74 f592cbbb 00012024 f592ca14 85afee28 0x804d0044
    b984bc24 f592c2c7 8592faa8 866b0da0 b984bc58 afd!AfdPoll+0x20e
    b984bc34 804e37f7 86585c40 85afee28 806ee2d0 afd!AfdDispatchDeviceControl+0x53
    b984bc44 8056a101 85afef04 85f1a9a0 85afee28 nt!IopfCallDriver+0x31
    b984bc58 80579a8a 86585c40 85afee28 85f1a9a0 nt!IopSynchronousServiceTail+0x60
    b984bd00 8057bfa5 0000021c 00000000 00000000 nt!IopXxxControlFile+0x611
    b984bd34 804de7ec 0000021c 00000000 00000000 nt!NtDeviceIoControlFile+0x2a
    b984bd34 7c90eb94 0000021c 00000000 00000000 nt!KiFastCallEntry+0xf8
    02bfff58 00000000 00000000 00000000 00000000 0x7c90eb94


    STACK_COMMAND: kb

    FOLLOWUP_IP:
    afd!AfdPoll+20e
    f592cbbb 804b0e01 or byte ptr [ebx+0xe],0x1

    FAULTING_SOURCE_CODE:


    SYMBOL_STACK_INDEX: 2

    FOLLOWUP_NAME: MachineOwner

    SYMBOL_NAME: afd!AfdPoll+20e

    MODULE_NAME: afd

    IMAGE_NAME: afd.sys

    DEBUG_FLR_IMAGE_TIMESTAMP: 41107eb5

    FAILURE_BUCKET_ID: 0xD1_W_afd!AfdPoll+20e

    BUCKET_ID: 0xD1_W_afd!AfdPoll+20e

    Followup: MachineOwner
     
  2. 2006/02/20
    st8800

    st8800 Inactive Thread Starter

    Joined:
    2006/02/20
    Messages:
    3
    Likes Received:
    0
    This is actually the 1st debugged mini-dump. The one I posted earlier was the 2nd one.

    ------------------


    Microsoft (R) Windows Debugger Version 6.6.0003.5
    Copyright (c) Microsoft Corporation. All rights reserved.


    Loading Dump File [C:\WINDOWS\Minidump\Mini022006-01.dmp]
    Mini Kernel Dump File: Only registers and stack trace are available

    Symbol search path is: SRV*c:\local cache*http://msdl.microsoft.com/download/symbols
    Executable search path is:
    Windows XP Kernel Version 2600 (Service Pack 2) UP Free x86 compatible
    Product: WinNt, suite: TerminalServer SingleUserTS
    Built by: 2600.xpsp_sp2_gdr.050301-1519
    Kernel base = 0x804d7000 PsLoadedModuleList = 0x8055a420
    Debug session time: Mon Feb 20 17:51:57.531 2006 (GMT+8)
    System Uptime: 0 days 0:19:07.106
    Loading Kernel Symbols
    ...................................................................................................................
    Loading User Symbols
    Loading unloaded module list
    ..........
    *******************************************************************************
    * *
    * Bugcheck Analysis *
    * *
    *******************************************************************************

    Use !analyze -v to get detailed debugging information.

    BugCheck 1000000A, {72c37820, 5, 0, 804e00a4}

    Probably caused by : hardware ( nt!KiInterruptDispatch+3d )

    Followup: MachineOwner
    ---------

    kd> !analyze -v
    *******************************************************************************
    * *
    * Bugcheck Analysis *
    * *
    *******************************************************************************

    IRQL_NOT_LESS_OR_EQUAL (a)
    An attempt was made to access a pageable (or completely invalid) address at an
    interrupt request level (IRQL) that is too high. This is usually
    caused by drivers using improper addresses.
    If a kernel debugger is available get the stack backtrace.
    Arguments:
    Arg1: 72c37820, memory referenced
    Arg2: 00000005, IRQL
    Arg3: 00000000, value 0 = read operation, 1 = write operation
    Arg4: 804e00a4, address which referenced memory

    Debugging Details:
    ------------------


    READ_ADDRESS: 72c37820

    CURRENT_IRQL: 5

    FAULTING_IP:
    nt!KiInterruptDispatch+3d
    804da915 837df400 cmp dword ptr [ebp-0xc],0x0

    CUSTOMER_CRASH_COUNT: 1

    DEFAULT_BUCKET_ID: DRIVER_FAULT

    BUGCHECK_STR: 0xA

    MISALIGNED_IP:
    nt!KiTrap06+3ac
    804e00a4 8491010000b9 test [ecx+0xb9000001],dl

    LAST_CONTROL_TRANSFER: from 804da915 to 804e00a4

    STACK_TEXT:
    b9c37810 804da915 8677a668 015afe90 00010005 nt!KiTrap06+0x3ac
    b9c37810 77d4ebd0 8677a668 015afe90 00010005 nt!KiInterruptDispatch+0x3d
    WARNING: Frame IP not in any known module. Following frames may be wrong.
    0012fdc4 7c90eae3 0012fdd4 00000030 00030000 0x77d4ebd0
    0012fe20 005709ef 0017c278 00000000 00000000 0x7c90eae3
    00000000 00000000 00000000 00000000 00000000 0x5709ef


    STACK_COMMAND: kb

    FOLLOWUP_IP:
    nt!KiInterruptDispatch+3d
    804da915 837df400 cmp dword ptr [ebp-0xc],0x0

    FAULTING_SOURCE_CODE:


    SYMBOL_STACK_INDEX: 1

    FOLLOWUP_NAME: MachineOwner

    SYMBOL_NAME: nt!KiInterruptDispatch+3d

    IMAGE_NAME: hardware

    DEBUG_FLR_IMAGE_TIMESTAMP: 0

    MODULE_NAME: hardware

    FAILURE_BUCKET_ID: IP_MISALIGNED

    BUCKET_ID: IP_MISALIGNED

    Followup: MachineOwner
    ---------
     
    Last edited: 2006/02/20

  3. to hide this advert.

  4. 2006/02/20
    st8800

    st8800 Inactive Thread Starter

    Joined:
    2006/02/20
    Messages:
    3
    Likes Received:
    0
    Hijackthis

    If it helps, here is my HijackThis logfile:

    Logfile of HijackThis v1.99.1
    Scan saved at 9:16:48 PM, on 20/02/2006
    Platform: Windows XP SP2 (WinNT 5.01.2600)
    MSIE: Internet Explorer v6.00 SP2 (6.00.2900.2180)

    Running processes:
    C:\WINDOWS\System32\smss.exe
    C:\WINDOWS\system32\winlogon.exe
    C:\WINDOWS\system32\services.exe
    C:\WINDOWS\system32\lsass.exe
    C:\WINDOWS\system32\svchost.exe
    C:\WINDOWS\System32\svchost.exe
    C:\WINDOWS\system32\spoolsv.exe
    C:\WINDOWS\system32\nvsvc32.exe
    C:\WINDOWS\Explorer.EXE
    C:\Program Files\Logitech\iTouch\iTouch.exe
    C:\PROGRA~1\Logitech\MOUSEW~1\SYSTEM\EM_EXEC.EXE
    C:\WINDOWS\SOUNDMAN.EXE
    C:\Program Files\Common Files\Real\Update_OB\realsched.exe
    C:\WINDOWS\system32\ctfmon.exe
    C:\Program Files\iolo\System Mechanic Professional 6\SMSystemAnalyzer.exe
    C:\Program Files\Common Files\Ahead\lib\NMBgMonitor.exe
    C:\Program Files\Logitech\iTouch\kbdtray.exe
    C:\Program Files\BitComet\BitComet.exe
    C:\Program Files\Internet Explorer\iexplore.exe
    C:\Documents and Settings\Spencer\My Documents\HijackThis.exe

    R0 - HKCU\Software\Microsoft\Internet Explorer\Main,Start Page = http://www.bethelp.com/index.asp?Cat=112&Desc=0&Col=4&Par=110
    R0 - HKCU\Software\Microsoft\Internet Explorer\Main,Local Page =
    R0 - HKLM\Software\Microsoft\Internet Explorer\Main,Local Page =
    R1 - HKCU\Software\Microsoft\Internet Connection Wizard,ShellNext = wmplayer.exe //ICWLaunch
    O2 - BHO: (no name) - {53707962-6F74-2D53-2644-206D7942484F} - C:\Program Files\Spybot - Search & Destroy\SDHelper.dll
    O2 - BHO: SSVHelper Class - {761497BB-D6F0-462C-B6EB-D4DAF1D92D43} - C:\Program Files\Java\jre1.5.0_06\bin\ssv.dll
    O2 - BHO: Google Toolbar Helper - {AA58ED58-01DD-4d91-8333-CF10577473F7} - c:\program files\google\googletoolbar1.dll
    O3 - Toolbar: &Google - {2318C2B1-4965-11d4-9B18-009027A5CD4F} - c:\program files\google\googletoolbar1.dll
    O4 - HKLM\..\Run: [zBrowser Launcher] C:\Program Files\Logitech\iTouch\iTouch.exe
    O4 - HKLM\..\Run: [EM_EXEC] C:\PROGRA~1\Logitech\MOUSEW~1\SYSTEM\EM_EXEC.EXE
    O4 - HKLM\..\Run: [SoundMan] SOUNDMAN.EXE
    O4 - HKLM\..\Run: [NeroFilterCheck] C:\WINDOWS\system32\NeroCheck.exe
    O4 - HKLM\..\Run: [NvCplDaemon] RUNDLL32.EXE C:\WINDOWS\system32\NvCpl.dll,NvStartup
    O4 - HKLM\..\Run: [nwiz] nwiz.exe /install
    O4 - HKLM\..\Run: [NvMediaCenter] RUNDLL32.EXE C:\WINDOWS\system32\NvMcTray.dll,NvTaskbarInit
    O4 - HKLM\..\Run: [TkBellExe] "C:\Program Files\Common Files\Real\Update_OB\realsched.exe" -osboot
    O4 - HKLM\..\Run: [KAVPersonal50] "C:\Program Files\Kaspersky Lab\Kaspersky Security Suite\Kaspersky Anti-Virus Personal\kav.exe" /minimize
    O4 - HKCU\..\Run: [CTFMON.EXE] C:\WINDOWS\system32\ctfmon.exe
    O4 - HKCU\..\Run: [SMSystemAnalyzer] "C:\Program Files\iolo\System Mechanic Professional 6\SMSystemAnalyzer.exe "
    O4 - HKCU\..\Run: [BgMonitor_{79662E04-7C6C-4d9f-84C7-88D8A56B10AA}] "C:\Program Files\Common Files\Ahead\lib\NMBgMonitor.exe "
    O4 - Global Startup: Logitech Desktop Messenger.lnk = C:\Program Files\Logitech\Desktop Messenger\8876480\Program\LDMConf.exe
    O8 - Extra context menu item: &Google Search - res://C:\Program Files\Google\GoogleToolbar1.dll/cmsearch.html
    O8 - Extra context menu item: &Translate English Word - res://C:\Program Files\Google\GoogleToolbar1.dll/cmwordtrans.html
    O8 - Extra context menu item: Backward Links - res://C:\Program Files\Google\GoogleToolbar1.dll/cmbacklinks.html
    O8 - Extra context menu item: Cached Snapshot of Page - res://C:\Program Files\Google\GoogleToolbar1.dll/cmcache.html
    O8 - Extra context menu item: E&xport to Microsoft Excel - res://C:\PROGRA~1\MICROS~2\Office10\EXCEL.EXE/3000
    O8 - Extra context menu item: Similar Pages - res://C:\Program Files\Google\GoogleToolbar1.dll/cmsimilar.html
    O8 - Extra context menu item: Translate Page into English - res://C:\Program Files\Google\GoogleToolbar1.dll/cmtrans.html
    O9 - Extra button: (no name) - {08B0E5C0-4FCB-11CF-AAA5-00401C608501} - C:\Program Files\Java\jre1.5.0_06\bin\ssv.dll
    O9 - Extra 'Tools' menuitem: Sun Java Console - {08B0E5C0-4FCB-11CF-AAA5-00401C608501} - C:\Program Files\Java\jre1.5.0_06\bin\ssv.dll
    O16 - DPF: {6414512B-B978-451D-A0D8-FCFDF33E833C} (WUWebControl Class) - http://update.microsoft.com/windowsupdate/v6/V5Controls/en/x86/client/wuweb_site.cab?1139120716265
    O23 - Service: kavsvc - Kaspersky Lab - C:\Program Files\Kaspersky Lab\Kaspersky Security Suite\Kaspersky Anti-Virus Personal\kavsvc.exe
    O23 - Service: NVIDIA Display Driver Service (NVSvc) - NVIDIA Corporation - C:\WINDOWS\system32\nvsvc32.exe
     

Share This Page

  1. This site uses cookies to help personalise content, tailor your experience and to keep you logged in if you register.
    By continuing to use this site, you are consenting to our use of cookies.