hey ive been having alot of problems with my new computer recently. i get a bsod every 5 hours or so while operating.. either from playing a game such as wow or just browsing the desktop. im ready to smash it against a wall. i searched every forum i could but thats not helping.. i was woundering if there are anyone on the forums who can have a look at these minidumps and tell me what they think. i think the problem might be audio driver related because my ram checks fine with memtest86 and i replaced my video driver with the most updated one.
i have a nvidia 8800 gts 512 vid card
q6600 cpu
a Gigabyte GA-P35-DS3R mobo
sound card is built in to mobo
Microsoft (R) Windows Debugger Version 6.8.0004.0 X86
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [C:\WINDOWS\Minidump\Mini022808-02.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
Symbol search path is: SRV*c:\symbols*http://msdl.microsoft.com/download/symbols
Executable search path is:
Windows XP Kernel Version 2600 (Service Pack 2) MP (4 procs) Free x86 compatible
Product: WinNt, suite: TerminalServer SingleUserTS
Built by: 2600.xpsp_sp2_gdr.070227-2254
Kernel base = 0x804d7000 PsLoadedModuleList = 0x8055c700
Debug session time: Thu Feb 28 19:42:45.468 2008 (GMT-5)
System Uptime: 0 days 2:29:13.463
Loading Kernel Symbols
....................................................................................................................
Loading User Symbols
Loading unloaded module list
..........
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
Use !analyze -v to get detailed debugging information.
BugCheck C1, {9335cf00, 9335c3e0, 570100, 23}
Probably caused by : memory_corruption ( nt!MmFreeSpecialPool+2f4 )
Followup: MachineOwner
---------
0: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
SPECIAL_POOL_DETECTED_MEMORY_CORRUPTION (c1)
Special pool has detected memory corruption. Typically the current thread's
stack backtrace will reveal the guilty party.
Arguments:
Arg1: 9335cf00, address trying to free
Arg2: 9335c3e0, address where bits are corrupted
Arg3: 00570100, (reserved)
Arg4: 00000023, caller is freeing an address where nearby bytes within the same page have been corrupted
Debugging Details:
------------------
BUGCHECK_STR: 0xC1_23
SPECIAL_POOL_CORRUPTION_TYPE: 23
CUSTOMER_CRASH_COUNT: 2
DEFAULT_BUCKET_ID: DRIVER_FAULT
PROCESS_NAME: TeamSpeak.exe
IRP_ADDRESS: 9335cf00
LAST_CONTROL_TRANSFER: from 8066bd94 to 804f9deb
STACK_TEXT:
ac9a3b44 8066bd94 000000c1 9335cf00 9335c3e0 nt!KeBugCheckEx+0x1b
ac9a3b90 8054a32a 9335cf00 ac9a3c13 89c87ec0 nt!MmFreeSpecialPool+0x2f4
ac9a3bd0 8065d1f6 9335cf00 00000000 8065d391 nt!ExFreePoolWithTag+0x4a
ac9a3bdc 8065d391 8a371308 9335cf00 00000000 nt!VfIrpFree+0xc
ac9a3bf8 80656071 00000000 9335cf00 ac9a3c5c nt!VerifierIoFreeIrp+0x129
ac9a3c08 804f4d39 9335cf00 9335cf40 8a342da8 nt!IovFreeIrpPrivate+0x41
ac9a3c5c 804fed69 9335cf40 ac9a3ca8 ac9a3c9c nt!IopCompleteRequest+0x319
ac9a3cac 80502d44 00000000 00000000 00000000 nt!KiDeliverApc+0xb3
ac9a3cc4 804faf20 00000000 ac9a3d1c 00000000 nt!KiSwapThread+0xa8
ac9a3cec 805bf07c 00000001 00000006 ac9a3d01 nt!KeWaitForSingleObject+0x1c2
ac9a3d50 8054086c 000004d0 00000001 ac9a3d1c nt!NtWaitForSingleObject+0x9a
ac9a3d50 7c90eb94 000004d0 00000001 ac9a3d1c nt!KiFastCallEntry+0xfc
WARNING: Frame IP not in any known module. Following frames may be wrong.
00f8f810 00000000 00000000 00000000 00000000 0x7c90eb94
STACK_COMMAND: kb
FOLLOWUP_IP:
nt!MmFreeSpecialPool+2f4
8066bd94 8b4708 mov eax,dword ptr [edi+8]
SYMBOL_STACK_INDEX: 1
SYMBOL_NAME: nt!MmFreeSpecialPool+2f4
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: nt
DEBUG_FLR_IMAGE_TIMESTAMP: 45e53f9d
IMAGE_NAME: memory_corruption
FAILURE_BUCKET_ID: 0xC1_23_nt!MmFreeSpecialPool+2f4
BUCKET_ID: 0xC1_23_nt!MmFreeSpecialPool+2f4
Followup: MachineOwner
---------
Microsoft (R) Windows Debugger Version 6.8.0004.0 X86
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [C:\WINDOWS\Minidump\Mini022808-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
Symbol search path is: SRV*c:\symbols*http://msdl.microsoft.com/download/symbols
Executable search path is:
Windows XP Kernel Version 2600 (Service Pack 2) MP (4 procs) Free x86 compatible
Product: WinNt, suite: TerminalServer SingleUserTS
Built by: 2600.xpsp_sp2_gdr.070227-2254
Kernel base = 0x804d7000 PsLoadedModuleList = 0x8055c700
Debug session time: Thu Feb 28 17:13:01.203 2008 (GMT-5)
System Uptime: 0 days 7:44:43.200
Loading Kernel Symbols
....................................................................................................................
Loading User Symbols
Loading unloaded module list
..............
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
Use !analyze -v to get detailed debugging information.
BugCheck C1, {95840fb8, 95840c28, cb4048, 23}
Probably caused by : portcls.sys ( portcls!CIrpStream::ReleaseUnmappingIrp+5d )
Followup: MachineOwner
---------
0: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
SPECIAL_POOL_DETECTED_MEMORY_CORRUPTION (c1)
Special pool has detected memory corruption. Typically the current thread's
stack backtrace will reveal the guilty party.
Arguments:
Arg1: 95840fb8, address trying to free
Arg2: 95840c28, address where bits are corrupted
Arg3: 00cb4048, (reserved)
Arg4: 00000023, caller is freeing an address where nearby bytes within the same page have been corrupted
Debugging Details:
------------------
BUGCHECK_STR: 0xC1_23
SPECIAL_POOL_CORRUPTION_TYPE: 23
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: DRIVER_FAULT
PROCESS_NAME: Idle
LAST_CONTROL_TRANSFER: from 8066bd94 to 804f9deb
STACK_TEXT:
80550308 8066bd94 000000c1 95840fb8 95840c28 nt!KeBugCheckEx+0x1b
80550354 8054a32a 95840fb8 973d4f20 93bc0f48 nt!MmFreeSpecialPool+0x2f4
80550394 80658169 95840fb8 00000000 805503d8 nt!ExFreePoolWithTag+0x4a
805503a4 b3e456e9 95840fb8 973d4f20 95840fd0 nt!VerifierFreePool+0x1f
805503b8 b3e4567d 93bc0f48 95840fd0 0000a560 portcls!CIrpStream::ReleaseUnmappingIrp+0x5d
805503d8 b3e462df 973d4f20 00002c80 80550404 portcls!CIrpStream::Complete+0x94
80550414 b3e46704 00008c60 8055b0a0 ffdff000 portcls!CPortPinWaveCyclic::RequestService+0x39f
80550428 805450bf 967fcfa0 967fcf90 00000000 portcls!CServiceGroup::ServiceDpc+0x26
80550440 8055ae40 ffdffc50 00000000 8055ae40 nt!KiRetireDpcList+0x61
80550450 80544fa4 00000000 0000000e 00000000 nt!KiIdleThread0
80550454 00000000 0000000e 00000000 00000000 nt!KiIdleLoop+0x28
STACK_COMMAND: kb
FOLLOWUP_IP:
portcls!CIrpStream::ReleaseUnmappingIrp+5d
b3e456e9 8b4660 mov eax,dword ptr [esi+60h]
SYMBOL_STACK_INDEX: 4
SYMBOL_NAME: portcls!CIrpStream::ReleaseUnmappingIrp+5d
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: portcls
IMAGE_NAME: portcls.sys
DEBUG_FLR_IMAGE_TIMESTAMP: 40574e49
FAILURE_BUCKET_ID: 0xC1_23_portcls!CIrpStream::ReleaseUnmappingIrp+5d
BUCKET_ID: 0xC1_23_portcls!CIrpStream::ReleaseUnmappingIrp+5d
Followup: MachineOwner
---------
i have a nvidia 8800 gts 512 vid card
q6600 cpu
a Gigabyte GA-P35-DS3R mobo
sound card is built in to mobo
Microsoft (R) Windows Debugger Version 6.8.0004.0 X86
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [C:\WINDOWS\Minidump\Mini022808-02.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
Symbol search path is: SRV*c:\symbols*http://msdl.microsoft.com/download/symbols
Executable search path is:
Windows XP Kernel Version 2600 (Service Pack 2) MP (4 procs) Free x86 compatible
Product: WinNt, suite: TerminalServer SingleUserTS
Built by: 2600.xpsp_sp2_gdr.070227-2254
Kernel base = 0x804d7000 PsLoadedModuleList = 0x8055c700
Debug session time: Thu Feb 28 19:42:45.468 2008 (GMT-5)
System Uptime: 0 days 2:29:13.463
Loading Kernel Symbols
....................................................................................................................
Loading User Symbols
Loading unloaded module list
..........
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
Use !analyze -v to get detailed debugging information.
BugCheck C1, {9335cf00, 9335c3e0, 570100, 23}
Probably caused by : memory_corruption ( nt!MmFreeSpecialPool+2f4 )
Followup: MachineOwner
---------
0: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
SPECIAL_POOL_DETECTED_MEMORY_CORRUPTION (c1)
Special pool has detected memory corruption. Typically the current thread's
stack backtrace will reveal the guilty party.
Arguments:
Arg1: 9335cf00, address trying to free
Arg2: 9335c3e0, address where bits are corrupted
Arg3: 00570100, (reserved)
Arg4: 00000023, caller is freeing an address where nearby bytes within the same page have been corrupted
Debugging Details:
------------------
BUGCHECK_STR: 0xC1_23
SPECIAL_POOL_CORRUPTION_TYPE: 23
CUSTOMER_CRASH_COUNT: 2
DEFAULT_BUCKET_ID: DRIVER_FAULT
PROCESS_NAME: TeamSpeak.exe
IRP_ADDRESS: 9335cf00
LAST_CONTROL_TRANSFER: from 8066bd94 to 804f9deb
STACK_TEXT:
ac9a3b44 8066bd94 000000c1 9335cf00 9335c3e0 nt!KeBugCheckEx+0x1b
ac9a3b90 8054a32a 9335cf00 ac9a3c13 89c87ec0 nt!MmFreeSpecialPool+0x2f4
ac9a3bd0 8065d1f6 9335cf00 00000000 8065d391 nt!ExFreePoolWithTag+0x4a
ac9a3bdc 8065d391 8a371308 9335cf00 00000000 nt!VfIrpFree+0xc
ac9a3bf8 80656071 00000000 9335cf00 ac9a3c5c nt!VerifierIoFreeIrp+0x129
ac9a3c08 804f4d39 9335cf00 9335cf40 8a342da8 nt!IovFreeIrpPrivate+0x41
ac9a3c5c 804fed69 9335cf40 ac9a3ca8 ac9a3c9c nt!IopCompleteRequest+0x319
ac9a3cac 80502d44 00000000 00000000 00000000 nt!KiDeliverApc+0xb3
ac9a3cc4 804faf20 00000000 ac9a3d1c 00000000 nt!KiSwapThread+0xa8
ac9a3cec 805bf07c 00000001 00000006 ac9a3d01 nt!KeWaitForSingleObject+0x1c2
ac9a3d50 8054086c 000004d0 00000001 ac9a3d1c nt!NtWaitForSingleObject+0x9a
ac9a3d50 7c90eb94 000004d0 00000001 ac9a3d1c nt!KiFastCallEntry+0xfc
WARNING: Frame IP not in any known module. Following frames may be wrong.
00f8f810 00000000 00000000 00000000 00000000 0x7c90eb94
STACK_COMMAND: kb
FOLLOWUP_IP:
nt!MmFreeSpecialPool+2f4
8066bd94 8b4708 mov eax,dword ptr [edi+8]
SYMBOL_STACK_INDEX: 1
SYMBOL_NAME: nt!MmFreeSpecialPool+2f4
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: nt
DEBUG_FLR_IMAGE_TIMESTAMP: 45e53f9d
IMAGE_NAME: memory_corruption
FAILURE_BUCKET_ID: 0xC1_23_nt!MmFreeSpecialPool+2f4
BUCKET_ID: 0xC1_23_nt!MmFreeSpecialPool+2f4
Followup: MachineOwner
---------
Microsoft (R) Windows Debugger Version 6.8.0004.0 X86
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [C:\WINDOWS\Minidump\Mini022808-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
Symbol search path is: SRV*c:\symbols*http://msdl.microsoft.com/download/symbols
Executable search path is:
Windows XP Kernel Version 2600 (Service Pack 2) MP (4 procs) Free x86 compatible
Product: WinNt, suite: TerminalServer SingleUserTS
Built by: 2600.xpsp_sp2_gdr.070227-2254
Kernel base = 0x804d7000 PsLoadedModuleList = 0x8055c700
Debug session time: Thu Feb 28 17:13:01.203 2008 (GMT-5)
System Uptime: 0 days 7:44:43.200
Loading Kernel Symbols
....................................................................................................................
Loading User Symbols
Loading unloaded module list
..............
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
Use !analyze -v to get detailed debugging information.
BugCheck C1, {95840fb8, 95840c28, cb4048, 23}
Probably caused by : portcls.sys ( portcls!CIrpStream::ReleaseUnmappingIrp+5d )
Followup: MachineOwner
---------
0: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
SPECIAL_POOL_DETECTED_MEMORY_CORRUPTION (c1)
Special pool has detected memory corruption. Typically the current thread's
stack backtrace will reveal the guilty party.
Arguments:
Arg1: 95840fb8, address trying to free
Arg2: 95840c28, address where bits are corrupted
Arg3: 00cb4048, (reserved)
Arg4: 00000023, caller is freeing an address where nearby bytes within the same page have been corrupted
Debugging Details:
------------------
BUGCHECK_STR: 0xC1_23
SPECIAL_POOL_CORRUPTION_TYPE: 23
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: DRIVER_FAULT
PROCESS_NAME: Idle
LAST_CONTROL_TRANSFER: from 8066bd94 to 804f9deb
STACK_TEXT:
80550308 8066bd94 000000c1 95840fb8 95840c28 nt!KeBugCheckEx+0x1b
80550354 8054a32a 95840fb8 973d4f20 93bc0f48 nt!MmFreeSpecialPool+0x2f4
80550394 80658169 95840fb8 00000000 805503d8 nt!ExFreePoolWithTag+0x4a
805503a4 b3e456e9 95840fb8 973d4f20 95840fd0 nt!VerifierFreePool+0x1f
805503b8 b3e4567d 93bc0f48 95840fd0 0000a560 portcls!CIrpStream::ReleaseUnmappingIrp+0x5d
805503d8 b3e462df 973d4f20 00002c80 80550404 portcls!CIrpStream::Complete+0x94
80550414 b3e46704 00008c60 8055b0a0 ffdff000 portcls!CPortPinWaveCyclic::RequestService+0x39f
80550428 805450bf 967fcfa0 967fcf90 00000000 portcls!CServiceGroup::ServiceDpc+0x26
80550440 8055ae40 ffdffc50 00000000 8055ae40 nt!KiRetireDpcList+0x61
80550450 80544fa4 00000000 0000000e 00000000 nt!KiIdleThread0
80550454 00000000 0000000e 00000000 00000000 nt!KiIdleLoop+0x28
STACK_COMMAND: kb
FOLLOWUP_IP:
portcls!CIrpStream::ReleaseUnmappingIrp+5d
b3e456e9 8b4660 mov eax,dword ptr [esi+60h]
SYMBOL_STACK_INDEX: 4
SYMBOL_NAME: portcls!CIrpStream::ReleaseUnmappingIrp+5d
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: portcls
IMAGE_NAME: portcls.sys
DEBUG_FLR_IMAGE_TIMESTAMP: 40574e49
FAILURE_BUCKET_ID: 0xC1_23_portcls!CIrpStream::ReleaseUnmappingIrp+5d
BUCKET_ID: 0xC1_23_portcls!CIrpStream::ReleaseUnmappingIrp+5d
Followup: MachineOwner
---------