Sometimes my computer freezes while being idle, and sometimes I get bsods like irql not less or equal, kernel auto boost lock acquisition with raised irql or so. These all started with me buying a new HDD to replace my old one. Replaced, installed windows 10 then these problems started to occur. diskpart was not working, neither was system file checker so I reformatted from scratch. Now I only faced with idle hanging and unexpected kernel mode trap issues. I got a memory dump from bsod. Here's how it reads:
Microsoft (R) Windows Debugger Version 6.3.9600.17336 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [C:\Windows\MEMORY.DMP]
Kernel Bitmap Dump File: Only kernel address space is available
************* Symbol Path validation summary **************
Response Time (ms) Location
Deferred SRV*C:\Windows\symbol_cache*http://msdl.microsoft.com/download/symbols
Symbol search path is: SRV*C:\Windows\symbol_cache*http://msdl.microsoft.com/download/symbols
Executable search path is:
Windows 8 Kernel Version 14393 MP (4 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS Personal
Built by: 14393.693.amd64fre.rs1_release.161220-1747
Machine Name:
Kernel base = 0xfffff800`27400000 PsLoadedModuleList = 0xfffff800`27705060
Debug session time: Sat Jan 21 13:09:33.604 2017 (UTC + 3:00)
System Uptime: 0 days 1:16:04.342
Loading Kernel Symbols
...............................................................
................................................................
............................
Loading User Symbols
PEB is paged out (Peb.Ldr = 000000a4`0a920018). Type ".hh dbgerr001" for details
Loading unloaded module list
.........
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
Use !analyze -v to get detailed debugging information.
BugCheck 7F, {8, ffff8400cd000a30, ffff8400d1963b60, fffff80027491ee6}
Page 225c3c not present in the dump file. Type ".hh dbgerr004" for details
Probably caused by : ntkrnlmp.exe ( nt!KiDoubleFaultAbort+b3 )
Followup: MachineOwner
---------
1: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
UNEXPECTED_KERNEL_MODE_TRAP (7f)
This means a trap occurred in kernel mode, and it's a trap of a kind
that the kernel isn't allowed to have/catch (bound trap) or that
is always instant death (double fault). The first number in the
bugcheck params is the number of the trap (8 = double fault, etc)
Consult an Intel x86 family manual to learn more about what these
traps are. Here is a *portion* of those codes:
If kv shows a taskGate
use .tss on the part before the colon, then kv.
Else if kv shows a trapframe
use .trap on that value
Else
.trap on the appropriate frame will show where the trap was taken
(on x86, this will be the ebp that goes with the procedure KiTrap)
Endif
kb will then show the corrected stack.
Arguments:
Arg1: 0000000000000008, EXCEPTION_DOUBLE_FAULT
Arg2: ffff8400cd000a30
Arg3: ffff8400d1963b60
Arg4: fffff80027491ee6
Debugging Details:
------------------
Page 225c3c not present in the dump file. Type ".hh dbgerr004" for details
OVERLAPPED_MODULE: Address regions for 'Ndu' and 'dump_ataport.sys' overlap
BUGCHECK_STR: 0x7f_8
DEFAULT_BUCKET_ID: WIN8_DRIVER_FAULT
PROCESS_NAME: chrome.exe
CURRENT_IRQL: 0
ANALYSIS_VERSION: 6.3.9600.17336 (debuggers(dbg).150226-1500) amd64fre
EXCEPTION_RECORD: 0200187044010000 -- (.exr 0x200187044010000)
Cannot read Exception record @ 0200187044010000
TRAP_FRAME: 17000000002e4301 -- (.trap 0x17000000002e4301)
Unable to read trap frame at 17000000`002e4301
LAST_CONTROL_TRANSFER: from fffff80027555829 to fffff8002754a6f0
STACK_TEXT:
ffff8400`cd0008e8 fffff800`27555829 : 00000000`0000007f 00000000`00000008 ffff8400`cd000a30 ffff8400`d1963b60 : nt!KeBugCheckEx
ffff8400`cd0008f0 fffff800`275536b3 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiBugCheckDispatch+0x69
ffff8400`cd000a30 fffff800`27491ee6 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiDoubleFaultAbort+0xb3
ffff8400`d1963b60 fffff800`27555902 : 02001870`44010000 002e5902`2e71725a 17000000`002e4301 05000009`6305005b : nt!KiDispatchException+0xc6
ffff8400`d1964230 fffff800`27553de1 : 00000000`00000000 00000000`00000000 00000045`2d000000 00000000`00000000 : nt!KiExceptionDispatch+0xc2
ffff8400`d1964410 fffff800`27493de5 : ffff8400`d196a000 ffff8400`d19652f0 ffff8400`d1964000 00000000`00000000 : nt!KiPageFault+0x221
ffff8400`d19645a0 fffff800`27539d72 : fffff800`276b916c ffff8400`00000001 ffff8400`d1968fe0 ffff8400`d1965450 : nt!RtlUnwindEx+0x6f5
ffff8400`d1964c80 fffff800`27550aed : ffff8400`d196a000 ffff8400`d1964e20 00000000`00000000 ffff8400`d1964000 : nt!_C_specific_handler+0xe2
ffff8400`d1964cf0 fffff800`274931b1 : ffff8400`d196a000 00000000`00000000 ffff8400`d1964000 00000000`00000000 : nt!RtlpExecuteHandlerForException+0xd
ffff8400`d1964d20 fffff800`27491f64 : ffff8400`d1965450 ffff8400`d1965950 ffff8400`d1965450 ffff8400`d1965c28 : nt!RtlDispatchException+0x421
ffff8400`d1965420 fffff800`27555902 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiDispatchException+0x144
ffff8400`d1965af0 fffff800`27553de1 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiExceptionDispatch+0xc2
ffff8400`d1965cd0 fffff800`27493de5 : ffff8400`d196a000 ffff8400`d1966bb0 ffff8400`d1964000 00000000`00000000 : nt!KiPageFault+0x221
ffff8400`d1965e60 fffff800`27539d72 : fffff800`276b916c ffff8400`00000001 ffff8400`d1968fe0 ffff8400`d1966d10 : nt!RtlUnwindEx+0x6f5
ffff8400`d1966540 fffff800`27550aed : ffff8400`d196a000 ffff8400`d19666e0 00000000`00000000 ffff8400`d1964000 : nt!_C_specific_handler+0xe2
ffff8400`d19665b0 fffff800`274931b1 : ffff8400`d196a000 00000000`00000000 ffff8400`d1964000 ff44c45c`ff44c45c : nt!RtlpExecuteHandlerForException+0xd
ffff8400`d19665e0 fffff800`27491f64 : ffff8400`d1966d10 ffff8400`d1967210 ffff8400`d1966d10 ffff8400`d19674e8 : nt!RtlDispatchException+0x421
ffff8400`d1966ce0 fffff800`27555902 : ffffae87`cec38000 00000000`00000050 00000000`00000801 ffffc404`92967fb0 : nt!KiDispatchException+0x144
ffff8400`d19673b0 fffff800`27553de1 : ffffae87`cec38000 00000000`00000050 00000000`00000801 ffffc404`8f7461e0 : nt!KiExceptionDispatch+0xc2
ffff8400`d1967590 fffff800`27493de5 : ffff8400`d196a000 ffff8400`d1968470 ffff8400`d1964000 00000000`00000000 : nt!KiPageFault+0x221
ffff8400`d1967720 fffff800`27539d72 : fffff800`276b916c ffff8400`00000001 ffff8400`d1968fe0 fffff800`27887cf0 : nt!RtlUnwindEx+0x6f5
ffff8400`d1967e00 fffff800`27550aed : ffff8400`d196a000 ffff8400`d1967fa0 00000000`00000000 00000000`00000000 : nt!_C_specific_handler+0xe2
ffff8400`d1967e70 fffff800`274931b1 : ffff8400`d196a000 00000000`00000000 ffff8400`d1964000 00000000`00000002 : nt!RtlpExecuteHandlerForException+0xd
ffff8400`d1967ea0 fffff800`27491f64 : ffff8400`d19685d0 ffff8400`d1968ad0 ffff8400`d19685d0 ffff8400`d1968da8 : nt!RtlDispatchException+0x421
ffff8400`d19685a0 fffff800`27555902 : 00000000`00000000 00000000`00000000 00000000`00000001 00000000`00000000 : nt!KiDispatchException+0x144
ffff8400`d1968c70 fffff800`27553de1 : 00000000`00020019 ffff8400`d1968f90 00000000`ffffffff fffff800`274df5d4 : nt!KiExceptionDispatch+0xc2
ffff8400`d1968e50 fffff800`27492c50 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiPageFault+0x221
ffff8400`d1968fe0 fffff800`27492427 : 00000000`00000000 00000000`00000000 ffff8400`cd240180 fffff800`274665b4 : nt!KiOpDecode+0x120
ffff8400`d1969040 fffff800`27491f17 : ffff8400`d1969110 ffff8400`d1969780 00000000`0010005f ffff8400`d1969a58 : nt!KiPreprocessFault+0xaf
ffff8400`d19690e0 fffff800`27555902 : 00000000`00000000 000002b4`00000201 00000000`00000000 ffff8400`d1969a90 : nt!KiDispatchException+0xf7
ffff8400`d1969920 fffff800`27553de1 : ffffae87`d0b35500 ffffae87`d0b35500 ffff8400`d1969b80 00000258`3386c180 : nt!KiExceptionDispatch+0xc2
ffff8400`d1969b00 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiPageFault+0x221
STACK_COMMAND: kb
FOLLOWUP_IP:
nt!KiDoubleFaultAbort+b3
fffff800`275536b3 90 nop
SYMBOL_STACK_INDEX: 2
SYMBOL_NAME: nt!KiDoubleFaultAbort+b3
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: nt
IMAGE_NAME: ntkrnlmp.exe
DEBUG_FLR_IMAGE_TIMESTAMP: 585a2651
BUCKET_ID_FUNC_OFFSET: b3
FAILURE_BUCKET_ID: 0x7f_8_nt!KiDoubleFaultAbort
BUCKET_ID: 0x7f_8_nt!KiDoubleFaultAbort
ANALYSIS_SOURCE: KM
FAILURE_ID_HASH_STRING: km:0x7f_8_nt!kidoublefaultabort
FAILURE_ID_HASH: {d1f8395a-8c58-45da-6ebf-e8bb4aad2fc5}
Followup: MachineOwner
---------
I dont think any of my hardware is faulty, I chkdsk'd both of my hdds, none found guilty.
edit: It just rebooted now, no bsod.
Microsoft (R) Windows Debugger Version 6.3.9600.17336 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [C:\Windows\MEMORY.DMP]
Kernel Bitmap Dump File: Only kernel address space is available
************* Symbol Path validation summary **************
Response Time (ms) Location
Deferred SRV*C:\Windows\symbol_cache*http://msdl.microsoft.com/download/symbols
Symbol search path is: SRV*C:\Windows\symbol_cache*http://msdl.microsoft.com/download/symbols
Executable search path is:
Windows 8 Kernel Version 14393 MP (4 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS Personal
Built by: 14393.693.amd64fre.rs1_release.161220-1747
Machine Name:
Kernel base = 0xfffff800`27400000 PsLoadedModuleList = 0xfffff800`27705060
Debug session time: Sat Jan 21 13:09:33.604 2017 (UTC + 3:00)
System Uptime: 0 days 1:16:04.342
Loading Kernel Symbols
...............................................................
................................................................
............................
Loading User Symbols
PEB is paged out (Peb.Ldr = 000000a4`0a920018). Type ".hh dbgerr001" for details
Loading unloaded module list
.........
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
Use !analyze -v to get detailed debugging information.
BugCheck 7F, {8, ffff8400cd000a30, ffff8400d1963b60, fffff80027491ee6}
Page 225c3c not present in the dump file. Type ".hh dbgerr004" for details
Probably caused by : ntkrnlmp.exe ( nt!KiDoubleFaultAbort+b3 )
Followup: MachineOwner
---------
1: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
UNEXPECTED_KERNEL_MODE_TRAP (7f)
This means a trap occurred in kernel mode, and it's a trap of a kind
that the kernel isn't allowed to have/catch (bound trap) or that
is always instant death (double fault). The first number in the
bugcheck params is the number of the trap (8 = double fault, etc)
Consult an Intel x86 family manual to learn more about what these
traps are. Here is a *portion* of those codes:
If kv shows a taskGate
use .tss on the part before the colon, then kv.
Else if kv shows a trapframe
use .trap on that value
Else
.trap on the appropriate frame will show where the trap was taken
(on x86, this will be the ebp that goes with the procedure KiTrap)
Endif
kb will then show the corrected stack.
Arguments:
Arg1: 0000000000000008, EXCEPTION_DOUBLE_FAULT
Arg2: ffff8400cd000a30
Arg3: ffff8400d1963b60
Arg4: fffff80027491ee6
Debugging Details:
------------------
Page 225c3c not present in the dump file. Type ".hh dbgerr004" for details
OVERLAPPED_MODULE: Address regions for 'Ndu' and 'dump_ataport.sys' overlap
BUGCHECK_STR: 0x7f_8
DEFAULT_BUCKET_ID: WIN8_DRIVER_FAULT
PROCESS_NAME: chrome.exe
CURRENT_IRQL: 0
ANALYSIS_VERSION: 6.3.9600.17336 (debuggers(dbg).150226-1500) amd64fre
EXCEPTION_RECORD: 0200187044010000 -- (.exr 0x200187044010000)
Cannot read Exception record @ 0200187044010000
TRAP_FRAME: 17000000002e4301 -- (.trap 0x17000000002e4301)
Unable to read trap frame at 17000000`002e4301
LAST_CONTROL_TRANSFER: from fffff80027555829 to fffff8002754a6f0
STACK_TEXT:
ffff8400`cd0008e8 fffff800`27555829 : 00000000`0000007f 00000000`00000008 ffff8400`cd000a30 ffff8400`d1963b60 : nt!KeBugCheckEx
ffff8400`cd0008f0 fffff800`275536b3 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiBugCheckDispatch+0x69
ffff8400`cd000a30 fffff800`27491ee6 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiDoubleFaultAbort+0xb3
ffff8400`d1963b60 fffff800`27555902 : 02001870`44010000 002e5902`2e71725a 17000000`002e4301 05000009`6305005b : nt!KiDispatchException+0xc6
ffff8400`d1964230 fffff800`27553de1 : 00000000`00000000 00000000`00000000 00000045`2d000000 00000000`00000000 : nt!KiExceptionDispatch+0xc2
ffff8400`d1964410 fffff800`27493de5 : ffff8400`d196a000 ffff8400`d19652f0 ffff8400`d1964000 00000000`00000000 : nt!KiPageFault+0x221
ffff8400`d19645a0 fffff800`27539d72 : fffff800`276b916c ffff8400`00000001 ffff8400`d1968fe0 ffff8400`d1965450 : nt!RtlUnwindEx+0x6f5
ffff8400`d1964c80 fffff800`27550aed : ffff8400`d196a000 ffff8400`d1964e20 00000000`00000000 ffff8400`d1964000 : nt!_C_specific_handler+0xe2
ffff8400`d1964cf0 fffff800`274931b1 : ffff8400`d196a000 00000000`00000000 ffff8400`d1964000 00000000`00000000 : nt!RtlpExecuteHandlerForException+0xd
ffff8400`d1964d20 fffff800`27491f64 : ffff8400`d1965450 ffff8400`d1965950 ffff8400`d1965450 ffff8400`d1965c28 : nt!RtlDispatchException+0x421
ffff8400`d1965420 fffff800`27555902 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiDispatchException+0x144
ffff8400`d1965af0 fffff800`27553de1 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiExceptionDispatch+0xc2
ffff8400`d1965cd0 fffff800`27493de5 : ffff8400`d196a000 ffff8400`d1966bb0 ffff8400`d1964000 00000000`00000000 : nt!KiPageFault+0x221
ffff8400`d1965e60 fffff800`27539d72 : fffff800`276b916c ffff8400`00000001 ffff8400`d1968fe0 ffff8400`d1966d10 : nt!RtlUnwindEx+0x6f5
ffff8400`d1966540 fffff800`27550aed : ffff8400`d196a000 ffff8400`d19666e0 00000000`00000000 ffff8400`d1964000 : nt!_C_specific_handler+0xe2
ffff8400`d19665b0 fffff800`274931b1 : ffff8400`d196a000 00000000`00000000 ffff8400`d1964000 ff44c45c`ff44c45c : nt!RtlpExecuteHandlerForException+0xd
ffff8400`d19665e0 fffff800`27491f64 : ffff8400`d1966d10 ffff8400`d1967210 ffff8400`d1966d10 ffff8400`d19674e8 : nt!RtlDispatchException+0x421
ffff8400`d1966ce0 fffff800`27555902 : ffffae87`cec38000 00000000`00000050 00000000`00000801 ffffc404`92967fb0 : nt!KiDispatchException+0x144
ffff8400`d19673b0 fffff800`27553de1 : ffffae87`cec38000 00000000`00000050 00000000`00000801 ffffc404`8f7461e0 : nt!KiExceptionDispatch+0xc2
ffff8400`d1967590 fffff800`27493de5 : ffff8400`d196a000 ffff8400`d1968470 ffff8400`d1964000 00000000`00000000 : nt!KiPageFault+0x221
ffff8400`d1967720 fffff800`27539d72 : fffff800`276b916c ffff8400`00000001 ffff8400`d1968fe0 fffff800`27887cf0 : nt!RtlUnwindEx+0x6f5
ffff8400`d1967e00 fffff800`27550aed : ffff8400`d196a000 ffff8400`d1967fa0 00000000`00000000 00000000`00000000 : nt!_C_specific_handler+0xe2
ffff8400`d1967e70 fffff800`274931b1 : ffff8400`d196a000 00000000`00000000 ffff8400`d1964000 00000000`00000002 : nt!RtlpExecuteHandlerForException+0xd
ffff8400`d1967ea0 fffff800`27491f64 : ffff8400`d19685d0 ffff8400`d1968ad0 ffff8400`d19685d0 ffff8400`d1968da8 : nt!RtlDispatchException+0x421
ffff8400`d19685a0 fffff800`27555902 : 00000000`00000000 00000000`00000000 00000000`00000001 00000000`00000000 : nt!KiDispatchException+0x144
ffff8400`d1968c70 fffff800`27553de1 : 00000000`00020019 ffff8400`d1968f90 00000000`ffffffff fffff800`274df5d4 : nt!KiExceptionDispatch+0xc2
ffff8400`d1968e50 fffff800`27492c50 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiPageFault+0x221
ffff8400`d1968fe0 fffff800`27492427 : 00000000`00000000 00000000`00000000 ffff8400`cd240180 fffff800`274665b4 : nt!KiOpDecode+0x120
ffff8400`d1969040 fffff800`27491f17 : ffff8400`d1969110 ffff8400`d1969780 00000000`0010005f ffff8400`d1969a58 : nt!KiPreprocessFault+0xaf
ffff8400`d19690e0 fffff800`27555902 : 00000000`00000000 000002b4`00000201 00000000`00000000 ffff8400`d1969a90 : nt!KiDispatchException+0xf7
ffff8400`d1969920 fffff800`27553de1 : ffffae87`d0b35500 ffffae87`d0b35500 ffff8400`d1969b80 00000258`3386c180 : nt!KiExceptionDispatch+0xc2
ffff8400`d1969b00 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiPageFault+0x221
STACK_COMMAND: kb
FOLLOWUP_IP:
nt!KiDoubleFaultAbort+b3
fffff800`275536b3 90 nop
SYMBOL_STACK_INDEX: 2
SYMBOL_NAME: nt!KiDoubleFaultAbort+b3
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: nt
IMAGE_NAME: ntkrnlmp.exe
DEBUG_FLR_IMAGE_TIMESTAMP: 585a2651
BUCKET_ID_FUNC_OFFSET: b3
FAILURE_BUCKET_ID: 0x7f_8_nt!KiDoubleFaultAbort
BUCKET_ID: 0x7f_8_nt!KiDoubleFaultAbort
ANALYSIS_SOURCE: KM
FAILURE_ID_HASH_STRING: km:0x7f_8_nt!kidoublefaultabort
FAILURE_ID_HASH: {d1f8395a-8c58-45da-6ebf-e8bb4aad2fc5}
Followup: MachineOwner
---------
I dont think any of my hardware is faulty, I chkdsk'd both of my hdds, none found guilty.
edit: It just rebooted now, no bsod.