Alright, I am not sure if this is the right forum area for this, but here goes.
P4 hyperthreaded 2.8 gig processor
1 gig ram
400-450ish watt power supply
abit vt or v7 motherboard (can check if needed)
creative audigy gamer sound card
geforce fx 5700 ultra video card
....all the latest drivers I can find
About 6 weeks ago I was putting new ram in, but apparently the ram was bad and fried my old mobo (I put the ram in correctly, with all power off and plugs out, and while I was grounded, but still my computer got screwed).
After having a new mobo put in, and a computer shop working on my computer (as it wouldnt boot when the new mobo was in), the shop reinstalled xp and sent my comp home. The first night it rebooted, but I thought perhaps it was just a random one time thing (and I didn't exactly have the money to pay the shop again for more labor).
I then had a multiple week period where my computer would randomly freeze, reboot, go BSOD, etc. Both sticks of ram in my computer were bought after the initial incident, and both have been memtested for a long time with no errors.
Eventually I found a flash utility for clearing my cmos and flashing my bios, so I used that utility. My computer was fine for about two days, but then it started doing weird things again (though less than before the flash utility was used). Since then I have checked forums, sent in windows xp errors, etc., but I have been unable to solve the problem.
The good news is that my computer has ceased for the most part to reboot when I am just browsing the web, chatting, etc, but I can't play games without it eventually rebooting on me. Can anyone make any sense of these?:
UNEXPECTED_KERNEL_MODE_TRAP_M (1000007f)
This means a trap occurred in kernel mode, and it's a trap of a kind
that the kernel isn't allowed to have/catch (bound trap) or that
is always instant death (double fault). The first number in the
bugcheck params is the number of the trap (8 = double fault, etc)
Consult an Intel x86 family manual to learn more about what these
traps are. Here is a *portion* of those codes:
If kv shows a taskGate
use .tss on the part before the colon, then kv.
Else if kv shows a trapframe
use .trap on that value
Else
.trap on the appropriate frame will show where the trap was taken
(on x86, this will be the ebp that goes with the procedure KiTrap)
Endif
kb will then show the corrected stack.
Arguments:
Arg1: 0000000d, EXCEPTION_GP_FAULT
Arg2: 00000000
Arg3: 00000000
Arg4: 00000000
Debugging Details:
------------------
BUGCHECK_STR: 0x7f_d
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: DRIVER_FAULT
LAST_CONTROL_TRANSFER: from 804e1be8 to 806ff427
STACK_TEXT:
f78e2d3c 804e1be8 863c3e18 863c3da8 804e22d6 hal!KfLowerIrql+0x17
f78e2d48 804e22d6 80568010 805694fc 863c3da8 nt!KiSwapThread+0x8d
f78e2d74 804e238e 00000001 00000001 00000000 nt!KeRemoveQueue+0x22a
f78e2dac 80574128 80000000 00000000 00000000 nt!ExpWorkerThread+0xcc
f78e2ddc 804efc81 804e22f1 00000001 00000000 nt!PspSystemThreadStartup+0x34
00000000 00000000 00000000 00000000 00000000 nt!KiThreadStartup+0x16
FOLLOWUP_IP:
nt!KiSwapThread+8d
804e1be8 8bc7 mov eax,edi
SYMBOL_STACK_INDEX: 1
FOLLOWUP_NAME: MachineOwner
SYMBOL_NAME: nt!KiSwapThread+8d
MODULE_NAME: nt
IMAGE_NAME: ntkrnlmp.exe
DEBUG_FLR_IMAGE_TIMESTAMP: 42250f77
STACK_COMMAND: kb
FAILURE_BUCKET_ID: 0x7f_d_nt!KiSwapThread+8d
BUCKET_ID: 0x7f_d_nt!KiSwapThread+8d
Followup: MachineOwner
and...
UNEXPECTED_KERNEL_MODE_TRAP_M (1000007f)
This means a trap occurred in kernel mode, and it's a trap of a kind
that the kernel isn't allowed to have/catch (bound trap) or that
is always instant death (double fault). The first number in the
bugcheck params is the number of the trap (8 = double fault, etc)
Consult an Intel x86 family manual to learn more about what these
traps are. Here is a *portion* of those codes:
If kv shows a taskGate
use .tss on the part before the colon, then kv.
Else if kv shows a trapframe
use .trap on that value
Else
.trap on the appropriate frame will show where the trap was taken
(on x86, this will be the ebp that goes with the procedure KiTrap)
Endif
kb will then show the corrected stack.
Arguments:
Arg1: 0000000d, EXCEPTION_GP_FAULT
Arg2: 00000000
Arg3: 00000000
Arg4: 00000000
Debugging Details:
------------------
BUGCHECK_STR: 0x7f_d
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: DRIVER_FAULT
LAST_CONTROL_TRANSFER: from 804dc605 to 806ffae4
STACK_TEXT:
ba14fc30 804dc605 00000020 e39df170 00000000 hal!KeReleaseQueuedSpinLock+0x3c
ba14fc50 bf8018df bf89b5da bf000444 000015b8 nt!ExReleaseResourceLite+0x8d
ba14fc54 bf89b5da bf000444 000015b8 ba14fd4
0 win32k!GreReleaseSemaphore+0xa
ba14fc58 bf000444 000015b8 ba14fd40 bf000749 win32k!DxEngUnlockShareSem+0xb
ba14fc64 bf000749 e39df170 ba14fc80 ba14fd64 dxg!D3dUnlockContext+0x1c
ba14fd40 804dd99f 2e40001c 0a400016 0008fc00 dxg!DxD3dDrawPrimitives2+0x29f
ba14fd40 7c90eb94 2e40001c 0a400016 0008fc00 nt!KiFastCallEntry+0xfc
WARNING: Frame IP not in any known module. Following frames may be wrong.
0006fcb0 00000000 00000000 00000000 00000000 0x7c90eb94
FOLLOWUP_IP:
win32k!GreReleaseSemaphore+a
bf8018df ff25bca798bf jmp dword ptr [win32k!_imp__KeLeaveCriticalRegion (bf98a7bc)]
SYMBOL_STACK_INDEX: 2
FOLLOWUP_NAME: MachineOwner
SYMBOL_NAME: win32k!GreReleaseSemaphore+a
MODULE_NAME: win32k
IMAGE_NAME: win32k.sys
DEBUG_FLR_IMAGE_TIMESTAMP: 422511a2
STACK_COMMAND: kb
FAILURE_BUCKET_ID: 0x7f_d_win32k!GreReleaseSemaphore+a
BUCKET_ID: 0x7f_d_win32k!GreReleaseSemaphore+a
Followup: MachineOwner
I have other minidumps as well, but these are the two most recent. Any help or thoughts would be greatly appreciated!
P4 hyperthreaded 2.8 gig processor
1 gig ram
400-450ish watt power supply
abit vt or v7 motherboard (can check if needed)
creative audigy gamer sound card
geforce fx 5700 ultra video card
....all the latest drivers I can find
About 6 weeks ago I was putting new ram in, but apparently the ram was bad and fried my old mobo (I put the ram in correctly, with all power off and plugs out, and while I was grounded, but still my computer got screwed).
After having a new mobo put in, and a computer shop working on my computer (as it wouldnt boot when the new mobo was in), the shop reinstalled xp and sent my comp home. The first night it rebooted, but I thought perhaps it was just a random one time thing (and I didn't exactly have the money to pay the shop again for more labor).
I then had a multiple week period where my computer would randomly freeze, reboot, go BSOD, etc. Both sticks of ram in my computer were bought after the initial incident, and both have been memtested for a long time with no errors.
Eventually I found a flash utility for clearing my cmos and flashing my bios, so I used that utility. My computer was fine for about two days, but then it started doing weird things again (though less than before the flash utility was used). Since then I have checked forums, sent in windows xp errors, etc., but I have been unable to solve the problem.
The good news is that my computer has ceased for the most part to reboot when I am just browsing the web, chatting, etc, but I can't play games without it eventually rebooting on me. Can anyone make any sense of these?:
UNEXPECTED_KERNEL_MODE_TRAP_M (1000007f)
This means a trap occurred in kernel mode, and it's a trap of a kind
that the kernel isn't allowed to have/catch (bound trap) or that
is always instant death (double fault). The first number in the
bugcheck params is the number of the trap (8 = double fault, etc)
Consult an Intel x86 family manual to learn more about what these
traps are. Here is a *portion* of those codes:
If kv shows a taskGate
use .tss on the part before the colon, then kv.
Else if kv shows a trapframe
use .trap on that value
Else
.trap on the appropriate frame will show where the trap was taken
(on x86, this will be the ebp that goes with the procedure KiTrap)
Endif
kb will then show the corrected stack.
Arguments:
Arg1: 0000000d, EXCEPTION_GP_FAULT
Arg2: 00000000
Arg3: 00000000
Arg4: 00000000
Debugging Details:
------------------
BUGCHECK_STR: 0x7f_d
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: DRIVER_FAULT
LAST_CONTROL_TRANSFER: from 804e1be8 to 806ff427
STACK_TEXT:
f78e2d3c 804e1be8 863c3e18 863c3da8 804e22d6 hal!KfLowerIrql+0x17
f78e2d48 804e22d6 80568010 805694fc 863c3da8 nt!KiSwapThread+0x8d
f78e2d74 804e238e 00000001 00000001 00000000 nt!KeRemoveQueue+0x22a
f78e2dac 80574128 80000000 00000000 00000000 nt!ExpWorkerThread+0xcc
f78e2ddc 804efc81 804e22f1 00000001 00000000 nt!PspSystemThreadStartup+0x34
00000000 00000000 00000000 00000000 00000000 nt!KiThreadStartup+0x16
FOLLOWUP_IP:
nt!KiSwapThread+8d
804e1be8 8bc7 mov eax,edi
SYMBOL_STACK_INDEX: 1
FOLLOWUP_NAME: MachineOwner
SYMBOL_NAME: nt!KiSwapThread+8d
MODULE_NAME: nt
IMAGE_NAME: ntkrnlmp.exe
DEBUG_FLR_IMAGE_TIMESTAMP: 42250f77
STACK_COMMAND: kb
FAILURE_BUCKET_ID: 0x7f_d_nt!KiSwapThread+8d
BUCKET_ID: 0x7f_d_nt!KiSwapThread+8d
Followup: MachineOwner
and...
UNEXPECTED_KERNEL_MODE_TRAP_M (1000007f)
This means a trap occurred in kernel mode, and it's a trap of a kind
that the kernel isn't allowed to have/catch (bound trap) or that
is always instant death (double fault). The first number in the
bugcheck params is the number of the trap (8 = double fault, etc)
Consult an Intel x86 family manual to learn more about what these
traps are. Here is a *portion* of those codes:
If kv shows a taskGate
use .tss on the part before the colon, then kv.
Else if kv shows a trapframe
use .trap on that value
Else
.trap on the appropriate frame will show where the trap was taken
(on x86, this will be the ebp that goes with the procedure KiTrap)
Endif
kb will then show the corrected stack.
Arguments:
Arg1: 0000000d, EXCEPTION_GP_FAULT
Arg2: 00000000
Arg3: 00000000
Arg4: 00000000
Debugging Details:
------------------
BUGCHECK_STR: 0x7f_d
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: DRIVER_FAULT
LAST_CONTROL_TRANSFER: from 804dc605 to 806ffae4
STACK_TEXT:
ba14fc30 804dc605 00000020 e39df170 00000000 hal!KeReleaseQueuedSpinLock+0x3c
ba14fc50 bf8018df bf89b5da bf000444 000015b8 nt!ExReleaseResourceLite+0x8d
ba14fc54 bf89b5da bf000444 000015b8 ba14fd4
0 win32k!GreReleaseSemaphore+0xa
ba14fc58 bf000444 000015b8 ba14fd40 bf000749 win32k!DxEngUnlockShareSem+0xb
ba14fc64 bf000749 e39df170 ba14fc80 ba14fd64 dxg!D3dUnlockContext+0x1c
ba14fd40 804dd99f 2e40001c 0a400016 0008fc00 dxg!DxD3dDrawPrimitives2+0x29f
ba14fd40 7c90eb94 2e40001c 0a400016 0008fc00 nt!KiFastCallEntry+0xfc
WARNING: Frame IP not in any known module. Following frames may be wrong.
0006fcb0 00000000 00000000 00000000 00000000 0x7c90eb94
FOLLOWUP_IP:
win32k!GreReleaseSemaphore+a
bf8018df ff25bca798bf jmp dword ptr [win32k!_imp__KeLeaveCriticalRegion (bf98a7bc)]
SYMBOL_STACK_INDEX: 2
FOLLOWUP_NAME: MachineOwner
SYMBOL_NAME: win32k!GreReleaseSemaphore+a
MODULE_NAME: win32k
IMAGE_NAME: win32k.sys
DEBUG_FLR_IMAGE_TIMESTAMP: 422511a2
STACK_COMMAND: kb
FAILURE_BUCKET_ID: 0x7f_d_win32k!GreReleaseSemaphore+a
BUCKET_ID: 0x7f_d_win32k!GreReleaseSemaphore+a
Followup: MachineOwner
I have other minidumps as well, but these are the two most recent. Any help or thoughts would be greatly appreciated!