So I bought a dell vostro 1500 recently and it all ran fine up until a couple of days ago, vista keeps blue screening on me and nothing I've done seems to fix it. I've used system restore and Last Known good configuration but its still blue screening. Safe mode works fine. I used the windows debugging tools and got this, can anyone make sense of it?
1: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
PAGE_FAULT_IN_NONPAGED_AREA (50)
Invalid system memory was referenced. This cannot be protected by try-except,
it must be protected by a Probe. Typically the address is just plain bad or it
is pointing at freed memory.
Arguments:
Arg1: a6f21000, memory referenced.
Arg2: 00000000, value 0 = read operation, 1 = write operation.
Arg3: 81e05ebf, If non-zero, the instruction address which referenced the bad memory
address.
Arg4: 00000000, (reserved)
Debugging Details:
------------------
READ_ADDRESS: GetPointerFromAddress: unable to read from 81d315ac
Unable to read MiSystemVaType memory at 81d11760
a6f21000
FAULTING_IP:
nt!PfVerifyScenarioBuffer+5f4
81e05ebf 8b4120 mov eax,dword ptr [ecx+20h]
MM_INTERNAL_CODE: 0
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT
BUGCHECK_STR: 0x50
PROCESS_NAME: WmiPrvSE.exe
CURRENT_IRQL: 0
TRAP_FRAME: 9c114b24 -- (.trap 0xffffffff9c114b24)
ErrCode = 00000000
eax=00000000 ebx=3bae411d ecx=a6f20fe0 edx=a6f19000 esi=a6f1fa14 edi=01c7fd5a
eip=81e05ebf esp=9c114b98 ebp=9c114be8 iopl=0 nv up ei pl nz ac po nc
cs=0008 ss=0010 ds=0023 es=0023 fs=0030 gs=0000 efl=00010212
nt!PfVerifyScenarioBuffer+0x5f4:
81e05ebf 8b4120 mov eax,dword ptr [ecx+20h] ds:0023:a6f21000=????????
Resetting default scope
LAST_CONTROL_TRANSFER: from 81c8fa34 to 81ca9df2
STACK_TEXT:
9c114b0c 81c8fa34 00000000 a6f21000 00000000 nt!MmAccessFault+0x106
9c114b0c 81e05ebf 00000000 a6f21000 00000000 nt!KiTrap0E+0xdc
9c114be8 81e04091 01c7f7ef 9c114c64 00000000 nt!PfVerifyScenarioBuffer+0x5f4
9c114c5c 81e02666 0000706a 00000000 9c114c80 nt!PfSnGetPrefetchInstructions+0x12a
9c114cf0 81e04e6c 81d7756b 876651c0 9c114d50 nt!PfSnBeginAppLaunch+0x303
9c114d00 81e2537d 9c11f610 00000000 00000000 nt!PfProcessCreateNotification+0x65
9c114d50 81c9143e 00000000 776a0f18 00000001 nt!PspUserThreadStartup+0x12b
00000000 00000000 00000000 00000000 00000000 nt!KiThreadStartup+0x16
STACK_COMMAND: kb
FOLLOWUP_IP:
nt!PfVerifyScenarioBuffer+5f4
81e05ebf 8b4120 mov eax,dword ptr [ecx+20h]
SYMBOL_STACK_INDEX: 2
SYMBOL_NAME: nt!PfVerifyScenarioBuffer+5f4
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: nt
IMAGE_NAME: ntkrpamp.exe
DEBUG_FLR_IMAGE_TIMESTAMP: 4683092a
FAILURE_BUCKET_ID: 0x50_nt!PfVerifyScenarioBuffer+5f4
BUCKET_ID: 0x50_nt!PfVerifyScenarioBuffer+5f4
Followup: MachineOwner
---------
1: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
PAGE_FAULT_IN_NONPAGED_AREA (50)
Invalid system memory was referenced. This cannot be protected by try-except,
it must be protected by a Probe. Typically the address is just plain bad or it
is pointing at freed memory.
Arguments:
Arg1: a6f21000, memory referenced.
Arg2: 00000000, value 0 = read operation, 1 = write operation.
Arg3: 81e05ebf, If non-zero, the instruction address which referenced the bad memory
address.
Arg4: 00000000, (reserved)
Debugging Details:
------------------
READ_ADDRESS: GetPointerFromAddress: unable to read from 81d315ac
Unable to read MiSystemVaType memory at 81d11760
a6f21000
FAULTING_IP:
nt!PfVerifyScenarioBuffer+5f4
81e05ebf 8b4120 mov eax,dword ptr [ecx+20h]
MM_INTERNAL_CODE: 0
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT
BUGCHECK_STR: 0x50
PROCESS_NAME: WmiPrvSE.exe
CURRENT_IRQL: 0
TRAP_FRAME: 9c114b24 -- (.trap 0xffffffff9c114b24)
ErrCode = 00000000
eax=00000000 ebx=3bae411d ecx=a6f20fe0 edx=a6f19000 esi=a6f1fa14 edi=01c7fd5a
eip=81e05ebf esp=9c114b98 ebp=9c114be8 iopl=0 nv up ei pl nz ac po nc
cs=0008 ss=0010 ds=0023 es=0023 fs=0030 gs=0000 efl=00010212
nt!PfVerifyScenarioBuffer+0x5f4:
81e05ebf 8b4120 mov eax,dword ptr [ecx+20h] ds:0023:a6f21000=????????
Resetting default scope
LAST_CONTROL_TRANSFER: from 81c8fa34 to 81ca9df2
STACK_TEXT:
9c114b0c 81c8fa34 00000000 a6f21000 00000000 nt!MmAccessFault+0x106
9c114b0c 81e05ebf 00000000 a6f21000 00000000 nt!KiTrap0E+0xdc
9c114be8 81e04091 01c7f7ef 9c114c64 00000000 nt!PfVerifyScenarioBuffer+0x5f4
9c114c5c 81e02666 0000706a 00000000 9c114c80 nt!PfSnGetPrefetchInstructions+0x12a
9c114cf0 81e04e6c 81d7756b 876651c0 9c114d50 nt!PfSnBeginAppLaunch+0x303
9c114d00 81e2537d 9c11f610 00000000 00000000 nt!PfProcessCreateNotification+0x65
9c114d50 81c9143e 00000000 776a0f18 00000001 nt!PspUserThreadStartup+0x12b
00000000 00000000 00000000 00000000 00000000 nt!KiThreadStartup+0x16
STACK_COMMAND: kb
FOLLOWUP_IP:
nt!PfVerifyScenarioBuffer+5f4
81e05ebf 8b4120 mov eax,dword ptr [ecx+20h]
SYMBOL_STACK_INDEX: 2
SYMBOL_NAME: nt!PfVerifyScenarioBuffer+5f4
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: nt
IMAGE_NAME: ntkrpamp.exe
DEBUG_FLR_IMAGE_TIMESTAMP: 4683092a
FAILURE_BUCKET_ID: 0x50_nt!PfVerifyScenarioBuffer+5f4
BUCKET_ID: 0x50_nt!PfVerifyScenarioBuffer+5f4
Followup: MachineOwner
---------