BSOD

Associate
Joined
30 Nov 2009
Posts
9
Was wondering if anyone can help me. Network card stopped working so I put the recovery image back onto the Dell Dimension 5150, got the drivers sorted as far as I know, all seemed to install ok (have got an additional graphics card) and all windows updates installed. All seemed to be fine, but when I come to install any of my games I get a BSOD which doesn't seem to reference any drivers causing the problem etc. Just a location where the problem occured. Wondered if anyone could give me anything to try or could help me with finding out from the dump files what is causing the problem and a possible fix?

I have tested the memory with memtest and have ran a hdd test and both passed fine. No hardware has changed apart from the network card stopping working and then me doing a dell restore

Here's the latest dump file (taken out some of it as it was too long to post here as I haven't got the symbol files):


Microsoft (R) Windows Debugger Version 6.11.0001.404 X86
Copyright (c) Microsoft Corporation. All rights reserved.

Windows XP Kernel Version 2600 (Service Pack 3) MP (2 procs) Free x86 compatible
Product: WinNt, suite: TerminalServer SingleUserTS
Machine Name:
Kernel base = 0x804d7000 PsLoadedModuleList = 0x8055d720
Debug session time: Thu Jan 28 21:46:40.640 2010 (GMT+0)
System Uptime: 0 days 0:20:18.223

Unable to load image ntoskrnl.exe, Win32 error 0n2
*** WARNING: Unable to verify timestamp for ntoskrnl.exe
*** ERROR: Module load completed but symbols could not be loaded for ntoskrnl.exe
Loading Kernel Symbols
...............................................................
................................................................
.........................
Loading User Symbols
Loading unloaded module list
...................
Unable to load image fltmgr.sys, Win32 error 0n2
*** WARNING: Unable to verify timestamp for fltmgr.sys
*** ERROR: Module load completed but symbols could not be loaded for fltmgr.sys
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************

Use !analyze -v to get detailed debugging information.

BugCheck 1000007E, {c0000005, 804ed988, ba4f7c34, ba4f7930}

***** Kernel symbols are WRONG. Please fix symbols to do analysis.

*************************************************************************
*** ***
*** ***
*** Your debugger is not using the correct symbols ***
*** ***
*** In order for this command to work properly, your symbol path ***
*** must point to .pdb files that have full type information. ***
*** ***
*** Certain .pdb files (such as the public OS symbols) do not ***
*** contain the required information. Contact the group that ***
*** provided you with these symbols if you need this command to ***
*** work. ***
*** ***
*** Type referenced: nt!_KPRCB ***
*** ***
*************************************************************************
*************************************************************************
*** ***
*** ***
*** Your debugger is not using the correct symbols ***
*** ***
*** In order for this command to work properly, your symbol path ***
*** must point to .pdb files that have full type information. ***
*** ***
*** Certain .pdb files (such as the public OS symbols) do not ***
*** contain the required information. Contact the group that ***
*** provided you with these symbols if you need this command to ***
*** work. ***
*** ***
*** Type referenced: nt!KPRCB ***
*** ***
*************************************************************************
*************************************************************************
*** ***
*** ***
*** Your debugger is not using the correct symbols ***
*** ***
*** In order for this command to work properly, your symbol path ***
*** must point to .pdb files that have full type information. ***
*** ***
*** Certain .pdb files (such as the public OS symbols) do not ***
*** contain the required information. Contact the group that ***
*** provided you with these symbols if you need this command to ***
*** work. ***
*** ***
*** Type referenced: nt!_KPRCB ***
*** ***
*************************************************************************
*************************************************************************
*** ***
*** ***
*** Your debugger is not using the correct symbols ***
*** ***
*** In order for this command to work properly, your symbol path ***
*** must point to .pdb files that have full type information. ***
*** ***
*** Certain .pdb files (such as the public OS symbols) do not ***
*** contain the required information. Contact the group that ***
*** provided you with these symbols if you need this command to ***
*** work. ***
*** ***
*** Type referenced: nt!KPRCB ***
*** ***
*************************************************************************
*************************************************************************
*** ***
*** ***
*** Your debugger is not using the correct symbols ***
*** ***
*** In order for this command to work properly, your symbol path ***
*** must point to .pdb files that have full type information. ***
*** ***
*** Certain .pdb files (such as the public OS symbols) do not ***
*** contain the required information. Contact the group that ***
*** provided you with these symbols if you need this command to ***
*** work. ***
*** ***
*** Type referenced: nt!_KPRCB ***
*** ***
*************************************************************************
*************************************************************************
*** ***
*** ***
*** Your debugger is not using the correct symbols ***
*** ***
*** In order for this command to work properly, your symbol path ***
*** must point to .pdb files that have full type information. ***
*** ***
*** Certain .pdb files (such as the public OS symbols) do not ***
*** contain the required information. Contact the group that ***
*** provided you with these symbols if you need this command to ***
*** work. ***
*** ***
*** Type referenced: nt!_KPRCB ***
*** ***
*************************************************************************
*************************************************************************
*** ***
*** ***
*** Your debugger is not using the correct symbols ***
*** ***
*** In order for this command to work properly, your symbol path ***
*** must point to .pdb files that have full type information. ***
*** ***
*** Certain .pdb files (such as the public OS symbols) do not ***
*** contain the required information. Contact the group that ***
*** provided you with these symbols if you need this command to ***
*** work. ***
*** ***
*** Type referenced: nt!_KPRCB ***
*** ***
*************************************************************************
*********************************************************************
* Symbols can not be loaded because symbol path is not initialized. *
* *
* The Symbol Path can be set by: *
* using the _NT_SYMBOL_PATH environment variable. *
* using the -y <symbol_path> argument when starting the debugger. *
* using .sympath and .sympath+ *
*********************************************************************
*********************************************************************
* Symbols can not be loaded because symbol path is not initialized. *
* *
* The Symbol Path can be set by: *
* using the _NT_SYMBOL_PATH environment variable. *
* using the -y <symbol_path> argument when starting the debugger. *
* using .sympath and .sympath+ *
*********************************************************************
Probably caused by : ntoskrnl.exe ( nt+16988 )

Followup: MachineOwner
---------

0: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************

SYSTEM_THREAD_EXCEPTION_NOT_HANDLED_M (1000007e)
This is a very common bugcheck. Usually the exception address pinpoints
the driver/function that caused the problem. Always note this address
as well as the link date of the driver/image that contains this address.
Some common problems are exception code 0x80000003. This means a hard
coded breakpoint or assertion was hit, but this system was booted
/NODEBUG. This is not supposed to happen as developers should never have
hardcoded breakpoints in retail code, but ...
If this happens, make sure a debugger gets connected, and the
system is booted /DEBUG. This will let us see why this breakpoint is
happening.
Arguments:
Arg1: c0000005, The exception code that was not handled
Arg2: 804ed988, The address that the exception occurred at
Arg3: ba4f7c34, Exception Record Address
Arg4: ba4f7930, Context Record Address

Debugging Details:
------------------

ADDITIONAL_DEBUG_TEXT:
Use '!findthebuild' command to search for the target build information.
If the build information is available, run '!findthebuild -s ; .reload' to set symbol path and load symbols.

MODULE_NAME: nt

FAULTING_MODULE: 804d7000 nt

DEBUG_FLR_IMAGE_TIMESTAMP: 4a784394

EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - The instruction at 0x%08lx referenced memory at 0x%08lx. The memory could not be %s.

FAULTING_IP:
nt+16988
804ed988 8b5808 mov ebx,dword ptr [eax+8]

EXCEPTION_RECORD: ba4f7c34 -- (.exr 0xffffffffba4f7c34)
ExceptionAddress: 804ed988 (nt+0x00016988)
ExceptionCode: c0000005 (Access violation)
ExceptionFlags: 00000000
NumberParameters: 2
Parameter[0]: 00000000
Parameter[1]: 00000008
Attempt to read from address 00000008

CONTEXT: ba4f7930 -- (.cxr 0xffffffffba4f7930)
eax=00000000 ebx=88c9ba34 ecx=e6643254 edx=e6643228 esi=e6643228 edi=00000000
eip=804ed988 esp=ba4f7cfc ebp=ba4f7d08 iopl=0 nv up ei pl nz ac pe cy
cs=0008 ss=0010 ds=0023 es=0023 fs=0030 gs=0000 efl=00010217
nt+0x16988:
804ed988 8b5808 mov ebx,dword ptr [eax+8] ds:0023:00000008=????????
Resetting default scope

CUSTOMER_CRASH_COUNT: 1

DEFAULT_BUCKET_ID: DRIVER_FAULT

BUGCHECK_STR: 0x7E

LAST_CONTROL_TRANSFER: from b9f02b6c to 804ed988

STACK_TEXT:
WARNING: Stack unwind information not available. Following frames may be wrong.
ba4f7d08 b9f02b6c e6643228 88c9b7d8 e6643228 nt+0x16988
ba4f7d34 b9f040ba 88c9b7d8 8a714900 88ca2ee8 fltmgr+0x17b6c
ba4f7d50 b9ef68f7 88c9b85c 00000008 8a714900 fltmgr+0x190ba
ba4f7d68 b9efa64e 88ca2ee8 00000008 8056485c fltmgr+0xb8f7
ba4f7d7c 8053877d 8a714900 00000000 8a77cb30 fltmgr+0xf64e
ba4f7dac 805cff72 8a714900 00000000 00000000 nt+0x6177d
ba4f7ddc 805460ee 8053868e 00000001 00000000 nt+0xf8f72
00000000 00000000 00000000 00000000 00000000 nt+0x6f0ee


FOLLOWUP_IP:
nt+16988
804ed988 8b5808 mov ebx,dword ptr [eax+8]

SYMBOL_STACK_INDEX: 0

SYMBOL_NAME: nt+16988

FOLLOWUP_NAME: MachineOwner

IMAGE_NAME: ntoskrnl.exe

STACK_COMMAND: .cxr 0xffffffffba4f7930 ; kb

BUCKET_ID: WRONG_SYMBOLS

Followup: MachineOwner
---------
 
No, didn't realise that could cause a BSOD?

Would also be a bit weird that it only started happening since the recovery to fix the network card problem. I am assuming it is a driver problem / conflict because of circumstances, but I can't understand from the Dump files etc what is causing the problem
 
As above, i'd highly reccomend using a proper windows cd, rather then a Dell recovery disk, these are far from anything i'd consider stable at the best of times, almost the same as the stupid HP recovery CD's that are complete cack.
 
Unfortunately no, I don't have the actual disc. I have got a Windows XP disc from another machine but the Dell has Media Centre Edition on it so I am currently trying to get hold of a media for that as the code is stuck to the tower
 
A quick bit of googling..

you cant debug windows unless you have a debug symbol package installed AND your running it in debug mode (see the safe mode startup menu)

1) Go here first.
http://www.microsoft.com/whdc/devtools/deb...ng/default.mspx

2) Download debugger from here. http://msdl.microsoft.com/download/symbols...tup/instmsi.exe

3) Download symbols for SP2 (Huge file - 180mb)
http://msdl.microsoft.com/download/symbols...slp-Symbols.exe

4) Install the debugger and symbols. Follow prompts on screen for easy installation.

The follow these steps to configure the debugger:

Start the debugger, click file, source file path, and set that to C:\Windows\System32 (assuming that path is right to your system32 folder, and if it complains about not being able to load files, try either %systemroot% or C:\Windows) and do the same for Image File Path.

Then set the Symbol Path from the directions in this link (http://www.microsoft.com/whdc/devtools/debugging/symbols.mspx), changing downstream store to the place on your hdd you want to store downloaded kernel symbols.

Choose file \ open crash dump, navigate to your Minidump folder, (usually C:\Windows\minidump) after a blue screen, open the minidump, let it save workspace information, and then you'll get two windows.

Type !analyze -v to get a detailed analysis, and it will usually be able to tell you the exact file or files that caused the system to crash.
 
Back
Top Bottom