locked
BSOD help request RRS feed

  • Question

  • Hi, just had my first blue screen in over a year after reinstalling Windows 7 yesterday. Any idea what caused it? I appreciate any help, here's the dump: https://skydrive.live.com/?cid=3b08b69882bc7330&permissionsChanged=1&id=3B08B69882BC7330!105#cid=3B08B69882BC7330&id=3B08B69882BC7330!105&sc=documents

    Monday, November 14, 2011 7:50 PM

Answers

  • *******************************************************************************
    *                                                                             *
    *                        Bugcheck Analysis                                    *
    *                                                                             *
    *******************************************************************************
    IRQL_NOT_LESS_OR_EQUAL (a)
    An attempt was made to access a pageable (or completely invalid) address at an
    interrupt request level (IRQL) that is too high.  This is usually
    caused by drivers using improper addresses.
    If a kernel debugger is available get the stack backtrace.
    Arguments:
    Arg1: fffffa80237a5f20, memory referenced
    Arg2: 0000000000000002, IRQL
    Arg3: 0000000000000000, bitfield :
    bit 0 : value 0 = read operation, 1 = write operation
    bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
    Arg4: fffff80002f2df9f, address which referenced memory
    Debugging Details:
    ------------------
    READ_ADDRESS: GetPointerFromAddress: unable to read from fffff800030b5100
     fffffa80237a5f20 
    CURRENT_IRQL:  2
    FAULTING_IP: 
    nt!MiIdentifyPfn+23f
    fffff800`02f2df9f 4c8b7500        mov     r14,qword ptr [rbp]
    CUSTOMER_CRASH_COUNT:  1
    DEFAULT_BUCKET_ID:  VISTA_DRIVER_FAULT
    BUGCHECK_STR:  0xA
    PROCESS_NAME:  svchost.exe
    TRAP_FRAME:  fffff880027fb4e0 -- (.trap 0xfffff880027fb4e0)
    NOTE: The trap frame does not contain all registers.
    Some register values may be zeroed or incorrect.
    rax=0000000000000001 rbx=0000000000000000 rcx=0a00000000000020
    rdx=0000000000012749 rsi=0000000000000000 rdi=0000000000000000
    rip=fffff80002f2df9f rsp=fffff880027fb670 rbp=fffffa80237a5f20
     r8=000000000009732a  r9=0000000000000001 r10=0000000000000042
    r11=0000058000000000 r12=0000000000000000 r13=0000000000000000
    r14=0000000000000000 r15=0000000000000000
    iopl=0         nv up ei ng nz na pe nc
    nt!MiIdentifyPfn+0x23f:
    fffff800`02f2df9f 4c8b7500        mov     r14,qword ptr [rbp] ss:0018:fffffa80`237a5f20=????????????????
    Resetting default scope
    LAST_CONTROL_TRANSFER:  from fffff80002e821e9 to fffff80002e82c40
    STACK_TEXT:  
    fffff880`027fb398 fffff800`02e821e9 : 00000000`0000000a fffffa80`237a5f20 00000000`00000002 00000000`00000000 : nt!KeBugCheckEx
    fffff880`027fb3a0 fffff800`02e80e60 : 00000000`42506650 00000000`00000000 00000000`00000000 0200c600`00087334 : nt!KiBugCheckDispatch+0x69
    fffff880`027fb4e0 fffff800`02f2df9f : 00000000`00000000 02000000`00018290 00000000`42506600 fffff800`0316e73f : nt!KiPageFault+0x260
    fffff880`027fb670 fffff800`02f2ec7b : 00000000`00000000 00000000`00000004 fffffa80`05440660 fffffa80`0543f000 : nt!MiIdentifyPfn+0x23f
    fffff880`027fb710 fffff800`032937e5 : fffffa80`0543f000 fffff880`027fbca0 fffff880`027fb7e8 00000000`00000000 : nt!MmQueryPfnList+0xbb
    fffff880`027fb750 fffff800`031d64c8 : 00000000`00000006 00000000`00000000 fffffa80`0543f000 00000000`00000001 : nt!PfpPfnPrioRequest+0x115
    fffff880`027fb7a0 fffff800`0318cbd3 : 00000000`00000000 00000000`00000000 00000000`64496d4d 00000000`64496d01 : nt! ?? ::NNGAKEGL::`string'+0x4810d
    fffff880`027fb830 fffff800`0318d449 : 00000000`0168ba88 fffff800`02e85552 00000000`0168bae0 00000000`0168baa8 : nt!ExpQuerySystemInformation+0x1193
    fffff880`027fbbe0 fffff800`02e81ed3 : fffffa80`05f69b60 00000000`02609c90 00000000`02609c90 00000000`0168cfc0 : nt!NtQuerySystemInformation+0x4d
    fffff880`027fbc20 00000000`773d167a : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x13
    00000000`0168b9b8 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x773d167a
    STACK_COMMAND:  k
    FOLLOWUP_IP: 
    nt!MiIdentifyPfn+23f
    fffff800`02f2df9f 4c8b7500        mov     r14,qword ptr [rbp]
    SYMBOL_STACK_INDEX:  3
    SYMBOL_NAME:  nt!MiIdentifyPfn+23f
    FOLLOWUP_NAME:  MachineOwner
    MODULE_NAME: nt
    DEBUG_FLR_IMAGE_TIMESTAMP:  4e02aaa3
    IMAGE_NAME:  memory_corruption
    FAILURE_BUCKET_ID:  X64_0xA_nt!MiIdentifyPfn+23f
    BUCKET_ID:  X64_0xA_nt!MiIdentifyPfn+23f
    Followup: MachineOwner
    --------------------------------------------------------------------------------------------------------------------------------------

    The following actions might prevent an error like this from happening again:

    1. Download and install updates and device drivers for your computer from Windows Update.
    2. Scan your computer for computer viruses.
    3. Check your hard disk for errors.

     

    Regards,

     


    MCP | MCTS | MCITP
    • Marked as answer by Juke Chou Sunday, December 4, 2011 7:59 AM
    Wednesday, November 16, 2011 7:50 AM
  • IRQL_NOT_LESS_OR_EQUAL (a)
    An attempt was made to access a pageable (or completely invalid) address at an
    interrupt request level (IRQL) that is too high.  This is usually
    caused by drivers using improper addresses.
    If a kernel debugger is available get the stack backtrace.
    Arguments:
    Arg1: fffffa80237a5f20, memory referenced
    Arg2: 0000000000000002, IRQL
    Arg3: 0000000000000000, bitfield :
     bit 0 : value 0 = read operation, 1 = write operation
     bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
    Arg4: fffff80002f2df9f, address which referenced memory

    Debugging Details:
    ------------------


    READ_ADDRESS: GetPointerFromAddress: unable to read from fffff800030b5100
     fffffa80237a5f20

    CURRENT_IRQL:  2

    FAULTING_IP:
    nt!MiIdentifyPfn+23f
    fffff800`02f2df9f 4c8b7500        mov     r14,qword ptr [rbp]

    CUSTOMER_CRASH_COUNT:  1

    DEFAULT_BUCKET_ID:  VISTA_DRIVER_FAULT

    BUGCHECK_STR:  0xA

    PROCESS_NAME:  svchost.exe

    TRAP_FRAME:  fffff880027fb4e0 -- (.trap 0xfffff880027fb4e0)
    NOTE: The trap frame does not contain all registers.
    Some register values may be zeroed or incorrect.
    rax=0000000000000001 rbx=0000000000000000 rcx=0a00000000000020
    rdx=0000000000012749 rsi=0000000000000000 rdi=0000000000000000
    rip=fffff80002f2df9f rsp=fffff880027fb670 rbp=fffffa80237a5f20
     r8=000000000009732a  r9=0000000000000001 r10=0000000000000042
    r11=0000058000000000 r12=0000000000000000 r13=0000000000000000
    r14=0000000000000000 r15=0000000000000000
    iopl=0         nv up ei ng nz na pe nc
    nt!MiIdentifyPfn+0x23f:
    fffff800`02f2df9f 4c8b7500        mov     r14,qword ptr [rbp] ss:0018:fffffa80`237a5f20=????????????????
    Resetting default scope

    LAST_CONTROL_TRANSFER:  from fffff80002e821e9 to fffff80002e82c40

    STACK_TEXT: 
    fffff880`027fb398 fffff800`02e821e9 : 00000000`0000000a fffffa80`237a5f20 00000000`00000002 00000000`00000000 : nt!KeBugCheckEx
    fffff880`027fb3a0 fffff800`02e80e60 : 00000000`42506650 00000000`00000000 00000000`00000000 0200c600`00087334 : nt!KiBugCheckDispatch+0x69
    fffff880`027fb4e0 fffff800`02f2df9f : 00000000`00000000 02000000`00018290 00000000`42506600 fffff800`0316e73f : nt!KiPageFault+0x260
    fffff880`027fb670 fffff800`02f2ec7b : 00000000`00000000 00000000`00000004 fffffa80`05440660 fffffa80`0543f000 : nt!MiIdentifyPfn+0x23f
    fffff880`027fb710 fffff800`032937e5 : fffffa80`0543f000 fffff880`027fbca0 fffff880`027fb7e8 00000000`00000000 : nt!MmQueryPfnList+0xbb
    fffff880`027fb750 fffff800`031d64c8 : 00000000`00000006 00000000`00000000 fffffa80`0543f000 00000000`00000001 : nt!PfpPfnPrioRequest+0x115
    fffff880`027fb7a0 fffff800`0318cbd3 : 00000000`00000000 00000000`00000000 00000000`64496d4d 00000000`64496d01 : nt! ?? ::NNGAKEGL::`string'+0x4810d
    fffff880`027fb830 fffff800`0318d449 : 00000000`0168ba88 fffff800`02e85552 00000000`0168bae0 00000000`0168baa8 : nt!ExpQuerySystemInformation+0x1193
    fffff880`027fbbe0 fffff800`02e81ed3 : fffffa80`05f69b60 00000000`02609c90 00000000`02609c90 00000000`0168cfc0 : nt!NtQuerySystemInformation+0x4d
    fffff880`027fbc20 00000000`773d167a : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x13
    00000000`0168b9b8 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x773d167a


    STACK_COMMAND:  kb

    FOLLOWUP_IP:
    nt!MiIdentifyPfn+23f
    fffff800`02f2df9f 4c8b7500        mov     r14,qword ptr [rbp]

    SYMBOL_STACK_INDEX:  3

    SYMBOL_NAME:  nt!MiIdentifyPfn+23f

    FOLLOWUP_NAME:  MachineOwner

    MODULE_NAME: nt

    DEBUG_FLR_IMAGE_TIMESTAMP:  4e02aaa3

    IMAGE_NAME:  memory_corruption

    FAILURE_BUCKET_ID:  X64_0xA_nt!MiIdentifyPfn+23f

    BUCKET_ID:  X64_0xA_nt!MiIdentifyPfn+23f

    Followup: MachineOwner
    ---------

    http://msdn.microsoft.com/en-us/library/ff560129(v=VS.85).aspx


    Please remember to click “Mark as Answer” on the post that helps you, and to click “Unmark as Answer” if a marked post does not actually answer your question. This can be beneficial to other community members reading the thread. ”
    • Marked as answer by Juke Chou Sunday, December 4, 2011 7:59 AM
    Wednesday, November 16, 2011 7:29 AM
  • *******************************************************************************
    *                                                                             *
    *                        Bugcheck Analysis                                    *
    *                                                                             *
    *******************************************************************************
    IRQL_NOT_LESS_OR_EQUAL (a)
    An attempt was made to access a pageable (or completely invalid) address at an
    interrupt request level (IRQL) that is too high.  This is usually
    caused by drivers using improper addresses.
    If a kernel debugger is available get the stack backtrace.
    Arguments:
    Arg1: fffffa80237a5f20, memory referenced
    Arg2: 0000000000000002, IRQL
    Arg3: 0000000000000000, bitfield :
    bit 0 : value 0 = read operation, 1 = write operation
    bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
    Arg4: fffff80002f2df9f, address which referenced memory
    Debugging Details:
    ------------------
    READ_ADDRESS: GetPointerFromAddress: unable to read from fffff800030b5100
     fffffa80237a5f20 
    CURRENT_IRQL:  2
    FAULTING_IP: 
    nt!MiIdentifyPfn+23f
    fffff800`02f2df9f 4c8b7500        mov     r14,qword ptr [rbp]
    CUSTOMER_CRASH_COUNT:  1
    DEFAULT_BUCKET_ID:  VISTA_DRIVER_FAULT
    BUGCHECK_STR:  0xA
    PROCESS_NAME:  svchost.exe
    TRAP_FRAME:  fffff880027fb4e0 -- (.trap 0xfffff880027fb4e0)
    NOTE: The trap frame does not contain all registers.
    Some register values may be zeroed or incorrect.
    rax=0000000000000001 rbx=0000000000000000 rcx=0a00000000000020
    rdx=0000000000012749 rsi=0000000000000000 rdi=0000000000000000
    rip=fffff80002f2df9f rsp=fffff880027fb670 rbp=fffffa80237a5f20
     r8=000000000009732a  r9=0000000000000001 r10=0000000000000042
    r11=0000058000000000 r12=0000000000000000 r13=0000000000000000
    r14=0000000000000000 r15=0000000000000000
    iopl=0         nv up ei ng nz na pe nc
    nt!MiIdentifyPfn+0x23f:
    fffff800`02f2df9f 4c8b7500        mov     r14,qword ptr [rbp] ss:0018:fffffa80`237a5f20=????????????????
    Resetting default scope
    LAST_CONTROL_TRANSFER:  from fffff80002e821e9 to fffff80002e82c40
    STACK_TEXT:  
    fffff880`027fb398 fffff800`02e821e9 : 00000000`0000000a fffffa80`237a5f20 00000000`00000002 00000000`00000000 : nt!KeBugCheckEx
    fffff880`027fb3a0 fffff800`02e80e60 : 00000000`42506650 00000000`00000000 00000000`00000000 0200c600`00087334 : nt!KiBugCheckDispatch+0x69
    fffff880`027fb4e0 fffff800`02f2df9f : 00000000`00000000 02000000`00018290 00000000`42506600 fffff800`0316e73f : nt!KiPageFault+0x260
    fffff880`027fb670 fffff800`02f2ec7b : 00000000`00000000 00000000`00000004 fffffa80`05440660 fffffa80`0543f000 : nt!MiIdentifyPfn+0x23f
    fffff880`027fb710 fffff800`032937e5 : fffffa80`0543f000 fffff880`027fbca0 fffff880`027fb7e8 00000000`00000000 : nt!MmQueryPfnList+0xbb
    fffff880`027fb750 fffff800`031d64c8 : 00000000`00000006 00000000`00000000 fffffa80`0543f000 00000000`00000001 : nt!PfpPfnPrioRequest+0x115
    fffff880`027fb7a0 fffff800`0318cbd3 : 00000000`00000000 00000000`00000000 00000000`64496d4d 00000000`64496d01 : nt! ?? ::NNGAKEGL::`string'+0x4810d
    fffff880`027fb830 fffff800`0318d449 : 00000000`0168ba88 fffff800`02e85552 00000000`0168bae0 00000000`0168baa8 : nt!ExpQuerySystemInformation+0x1193
    fffff880`027fbbe0 fffff800`02e81ed3 : fffffa80`05f69b60 00000000`02609c90 00000000`02609c90 00000000`0168cfc0 : nt!NtQuerySystemInformation+0x4d
    fffff880`027fbc20 00000000`773d167a : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x13
    00000000`0168b9b8 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x773d167a
    STACK_COMMAND:  kb
    FOLLOWUP_IP: 
    nt!MiIdentifyPfn+23f
    fffff800`02f2df9f 4c8b7500        mov     r14,qword ptr [rbp]
    SYMBOL_STACK_INDEX:  3
    SYMBOL_NAME:  nt!MiIdentifyPfn+23f
    FOLLOWUP_NAME:  MachineOwner
    MODULE_NAME: nt
    DEBUG_FLR_IMAGE_TIMESTAMP:  4e02aaa3
    IMAGE_NAME:  memory_corruption
    FAILURE_BUCKET_ID:  X64_0xA_nt!MiIdentifyPfn+23f
    BUCKET_ID:  X64_0xA_nt!MiIdentifyPfn+23f
    Followup: MachineOwner
    ---------
    --------------------------------------------------------
    Please start by that:
    • Run memtest86+ to check that all is okay with your RAM. If an error was detected then replace the faulty RAM or contact your manufacturer Technical Support
    • Uninstall all unused programs
    • Update all possible drivers
    • Run msconfig and disable all startup items except Microsoft ones. Also, disable all services that you don't use

     

    You can also contact Microsoft CSS.

     


    This posting is provided "AS IS" with no warranties or guarantees , and confers no rights.

    Microsoft Student Partner 2010 / 2011
    Microsoft Certified Professional
    Microsoft Certified Systems Administrator: Security
    Microsoft Certified Systems Engineer: Security
    Microsoft Certified Technology Specialist: Windows Server 2008 Active Directory, Configuration
    Microsoft Certified Technology Specialist: Windows Server 2008 Network Infrastructure, Configuration
    Microsoft Certified Technology Specialist: Windows Server 2008 Applications Infrastructure, Configuration
    Microsoft Certified Technology Specialist: Windows 7, Configuring
    Microsoft Certified IT Professional: Enterprise Administrator
    Microsoft Certified IT Professional: Server Administrator
    Microsoft Certified Trainer

    • Marked as answer by Juke Chou Sunday, December 4, 2011 7:59 AM
    Thursday, November 17, 2011 9:41 PM

All replies

  • Forgot to mention that I had a NIC installed as well but it was disabled when the blue screen happened.
    Tuesday, November 15, 2011 11:45 PM
  • IRQL_NOT_LESS_OR_EQUAL (a)
    An attempt was made to access a pageable (or completely invalid) address at an
    interrupt request level (IRQL) that is too high.  This is usually
    caused by drivers using improper addresses.
    If a kernel debugger is available get the stack backtrace.
    Arguments:
    Arg1: fffffa80237a5f20, memory referenced
    Arg2: 0000000000000002, IRQL
    Arg3: 0000000000000000, bitfield :
     bit 0 : value 0 = read operation, 1 = write operation
     bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
    Arg4: fffff80002f2df9f, address which referenced memory

    Debugging Details:
    ------------------


    READ_ADDRESS: GetPointerFromAddress: unable to read from fffff800030b5100
     fffffa80237a5f20

    CURRENT_IRQL:  2

    FAULTING_IP:
    nt!MiIdentifyPfn+23f
    fffff800`02f2df9f 4c8b7500        mov     r14,qword ptr [rbp]

    CUSTOMER_CRASH_COUNT:  1

    DEFAULT_BUCKET_ID:  VISTA_DRIVER_FAULT

    BUGCHECK_STR:  0xA

    PROCESS_NAME:  svchost.exe

    TRAP_FRAME:  fffff880027fb4e0 -- (.trap 0xfffff880027fb4e0)
    NOTE: The trap frame does not contain all registers.
    Some register values may be zeroed or incorrect.
    rax=0000000000000001 rbx=0000000000000000 rcx=0a00000000000020
    rdx=0000000000012749 rsi=0000000000000000 rdi=0000000000000000
    rip=fffff80002f2df9f rsp=fffff880027fb670 rbp=fffffa80237a5f20
     r8=000000000009732a  r9=0000000000000001 r10=0000000000000042
    r11=0000058000000000 r12=0000000000000000 r13=0000000000000000
    r14=0000000000000000 r15=0000000000000000
    iopl=0         nv up ei ng nz na pe nc
    nt!MiIdentifyPfn+0x23f:
    fffff800`02f2df9f 4c8b7500        mov     r14,qword ptr [rbp] ss:0018:fffffa80`237a5f20=????????????????
    Resetting default scope

    LAST_CONTROL_TRANSFER:  from fffff80002e821e9 to fffff80002e82c40

    STACK_TEXT: 
    fffff880`027fb398 fffff800`02e821e9 : 00000000`0000000a fffffa80`237a5f20 00000000`00000002 00000000`00000000 : nt!KeBugCheckEx
    fffff880`027fb3a0 fffff800`02e80e60 : 00000000`42506650 00000000`00000000 00000000`00000000 0200c600`00087334 : nt!KiBugCheckDispatch+0x69
    fffff880`027fb4e0 fffff800`02f2df9f : 00000000`00000000 02000000`00018290 00000000`42506600 fffff800`0316e73f : nt!KiPageFault+0x260
    fffff880`027fb670 fffff800`02f2ec7b : 00000000`00000000 00000000`00000004 fffffa80`05440660 fffffa80`0543f000 : nt!MiIdentifyPfn+0x23f
    fffff880`027fb710 fffff800`032937e5 : fffffa80`0543f000 fffff880`027fbca0 fffff880`027fb7e8 00000000`00000000 : nt!MmQueryPfnList+0xbb
    fffff880`027fb750 fffff800`031d64c8 : 00000000`00000006 00000000`00000000 fffffa80`0543f000 00000000`00000001 : nt!PfpPfnPrioRequest+0x115
    fffff880`027fb7a0 fffff800`0318cbd3 : 00000000`00000000 00000000`00000000 00000000`64496d4d 00000000`64496d01 : nt! ?? ::NNGAKEGL::`string'+0x4810d
    fffff880`027fb830 fffff800`0318d449 : 00000000`0168ba88 fffff800`02e85552 00000000`0168bae0 00000000`0168baa8 : nt!ExpQuerySystemInformation+0x1193
    fffff880`027fbbe0 fffff800`02e81ed3 : fffffa80`05f69b60 00000000`02609c90 00000000`02609c90 00000000`0168cfc0 : nt!NtQuerySystemInformation+0x4d
    fffff880`027fbc20 00000000`773d167a : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x13
    00000000`0168b9b8 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x773d167a


    STACK_COMMAND:  kb

    FOLLOWUP_IP:
    nt!MiIdentifyPfn+23f
    fffff800`02f2df9f 4c8b7500        mov     r14,qword ptr [rbp]

    SYMBOL_STACK_INDEX:  3

    SYMBOL_NAME:  nt!MiIdentifyPfn+23f

    FOLLOWUP_NAME:  MachineOwner

    MODULE_NAME: nt

    DEBUG_FLR_IMAGE_TIMESTAMP:  4e02aaa3

    IMAGE_NAME:  memory_corruption

    FAILURE_BUCKET_ID:  X64_0xA_nt!MiIdentifyPfn+23f

    BUCKET_ID:  X64_0xA_nt!MiIdentifyPfn+23f

    Followup: MachineOwner
    ---------

    http://msdn.microsoft.com/en-us/library/ff560129(v=VS.85).aspx


    Please remember to click “Mark as Answer” on the post that helps you, and to click “Unmark as Answer” if a marked post does not actually answer your question. This can be beneficial to other community members reading the thread. ”
    • Marked as answer by Juke Chou Sunday, December 4, 2011 7:59 AM
    Wednesday, November 16, 2011 7:29 AM
  • *******************************************************************************
    *                                                                             *
    *                        Bugcheck Analysis                                    *
    *                                                                             *
    *******************************************************************************
    IRQL_NOT_LESS_OR_EQUAL (a)
    An attempt was made to access a pageable (or completely invalid) address at an
    interrupt request level (IRQL) that is too high.  This is usually
    caused by drivers using improper addresses.
    If a kernel debugger is available get the stack backtrace.
    Arguments:
    Arg1: fffffa80237a5f20, memory referenced
    Arg2: 0000000000000002, IRQL
    Arg3: 0000000000000000, bitfield :
    bit 0 : value 0 = read operation, 1 = write operation
    bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
    Arg4: fffff80002f2df9f, address which referenced memory
    Debugging Details:
    ------------------
    READ_ADDRESS: GetPointerFromAddress: unable to read from fffff800030b5100
     fffffa80237a5f20 
    CURRENT_IRQL:  2
    FAULTING_IP: 
    nt!MiIdentifyPfn+23f
    fffff800`02f2df9f 4c8b7500        mov     r14,qword ptr [rbp]
    CUSTOMER_CRASH_COUNT:  1
    DEFAULT_BUCKET_ID:  VISTA_DRIVER_FAULT
    BUGCHECK_STR:  0xA
    PROCESS_NAME:  svchost.exe
    TRAP_FRAME:  fffff880027fb4e0 -- (.trap 0xfffff880027fb4e0)
    NOTE: The trap frame does not contain all registers.
    Some register values may be zeroed or incorrect.
    rax=0000000000000001 rbx=0000000000000000 rcx=0a00000000000020
    rdx=0000000000012749 rsi=0000000000000000 rdi=0000000000000000
    rip=fffff80002f2df9f rsp=fffff880027fb670 rbp=fffffa80237a5f20
     r8=000000000009732a  r9=0000000000000001 r10=0000000000000042
    r11=0000058000000000 r12=0000000000000000 r13=0000000000000000
    r14=0000000000000000 r15=0000000000000000
    iopl=0         nv up ei ng nz na pe nc
    nt!MiIdentifyPfn+0x23f:
    fffff800`02f2df9f 4c8b7500        mov     r14,qword ptr [rbp] ss:0018:fffffa80`237a5f20=????????????????
    Resetting default scope
    LAST_CONTROL_TRANSFER:  from fffff80002e821e9 to fffff80002e82c40
    STACK_TEXT:  
    fffff880`027fb398 fffff800`02e821e9 : 00000000`0000000a fffffa80`237a5f20 00000000`00000002 00000000`00000000 : nt!KeBugCheckEx
    fffff880`027fb3a0 fffff800`02e80e60 : 00000000`42506650 00000000`00000000 00000000`00000000 0200c600`00087334 : nt!KiBugCheckDispatch+0x69
    fffff880`027fb4e0 fffff800`02f2df9f : 00000000`00000000 02000000`00018290 00000000`42506600 fffff800`0316e73f : nt!KiPageFault+0x260
    fffff880`027fb670 fffff800`02f2ec7b : 00000000`00000000 00000000`00000004 fffffa80`05440660 fffffa80`0543f000 : nt!MiIdentifyPfn+0x23f
    fffff880`027fb710 fffff800`032937e5 : fffffa80`0543f000 fffff880`027fbca0 fffff880`027fb7e8 00000000`00000000 : nt!MmQueryPfnList+0xbb
    fffff880`027fb750 fffff800`031d64c8 : 00000000`00000006 00000000`00000000 fffffa80`0543f000 00000000`00000001 : nt!PfpPfnPrioRequest+0x115
    fffff880`027fb7a0 fffff800`0318cbd3 : 00000000`00000000 00000000`00000000 00000000`64496d4d 00000000`64496d01 : nt! ?? ::NNGAKEGL::`string'+0x4810d
    fffff880`027fb830 fffff800`0318d449 : 00000000`0168ba88 fffff800`02e85552 00000000`0168bae0 00000000`0168baa8 : nt!ExpQuerySystemInformation+0x1193
    fffff880`027fbbe0 fffff800`02e81ed3 : fffffa80`05f69b60 00000000`02609c90 00000000`02609c90 00000000`0168cfc0 : nt!NtQuerySystemInformation+0x4d
    fffff880`027fbc20 00000000`773d167a : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x13
    00000000`0168b9b8 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x773d167a
    STACK_COMMAND:  k
    FOLLOWUP_IP: 
    nt!MiIdentifyPfn+23f
    fffff800`02f2df9f 4c8b7500        mov     r14,qword ptr [rbp]
    SYMBOL_STACK_INDEX:  3
    SYMBOL_NAME:  nt!MiIdentifyPfn+23f
    FOLLOWUP_NAME:  MachineOwner
    MODULE_NAME: nt
    DEBUG_FLR_IMAGE_TIMESTAMP:  4e02aaa3
    IMAGE_NAME:  memory_corruption
    FAILURE_BUCKET_ID:  X64_0xA_nt!MiIdentifyPfn+23f
    BUCKET_ID:  X64_0xA_nt!MiIdentifyPfn+23f
    Followup: MachineOwner
    --------------------------------------------------------------------------------------------------------------------------------------

    The following actions might prevent an error like this from happening again:

    1. Download and install updates and device drivers for your computer from Windows Update.
    2. Scan your computer for computer viruses.
    3. Check your hard disk for errors.

     

    Regards,

     


    MCP | MCTS | MCITP
    • Marked as answer by Juke Chou Sunday, December 4, 2011 7:59 AM
    Wednesday, November 16, 2011 7:50 AM
  • Thanks for the assistance.
    Wednesday, November 16, 2011 12:57 PM
  • Hi,

    This error doesn't follow what is normal for an IRQL_NOT_LESS_OR_EQUAL. You may wish to check for memory errors,

    http://mikemstech.blogspot.com/2011/11/troubleshooting-memory-errors.html

    If memtest86 or windiag don't find anything, let me know and I can propose a couple of different things to try.

    -- Mike Burr
    Technology
    Wednesday, November 16, 2011 7:16 PM
  • I tested the memory with the built-in windows tool which reported no errors, will test it with memtest now and I'll report back. So far I haven't received any other blue screens after I removed the NIC and reinstalled the audio, video and network drivers. Tested the ram with memtest and all seems well, 0 errors.
    • Edited by Bso_ Thursday, November 17, 2011 11:09 PM
    Thursday, November 17, 2011 8:41 PM
  • *******************************************************************************
    *                                                                             *
    *                        Bugcheck Analysis                                    *
    *                                                                             *
    *******************************************************************************
    IRQL_NOT_LESS_OR_EQUAL (a)
    An attempt was made to access a pageable (or completely invalid) address at an
    interrupt request level (IRQL) that is too high.  This is usually
    caused by drivers using improper addresses.
    If a kernel debugger is available get the stack backtrace.
    Arguments:
    Arg1: fffffa80237a5f20, memory referenced
    Arg2: 0000000000000002, IRQL
    Arg3: 0000000000000000, bitfield :
    bit 0 : value 0 = read operation, 1 = write operation
    bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
    Arg4: fffff80002f2df9f, address which referenced memory
    Debugging Details:
    ------------------
    READ_ADDRESS: GetPointerFromAddress: unable to read from fffff800030b5100
     fffffa80237a5f20 
    CURRENT_IRQL:  2
    FAULTING_IP: 
    nt!MiIdentifyPfn+23f
    fffff800`02f2df9f 4c8b7500        mov     r14,qword ptr [rbp]
    CUSTOMER_CRASH_COUNT:  1
    DEFAULT_BUCKET_ID:  VISTA_DRIVER_FAULT
    BUGCHECK_STR:  0xA
    PROCESS_NAME:  svchost.exe
    TRAP_FRAME:  fffff880027fb4e0 -- (.trap 0xfffff880027fb4e0)
    NOTE: The trap frame does not contain all registers.
    Some register values may be zeroed or incorrect.
    rax=0000000000000001 rbx=0000000000000000 rcx=0a00000000000020
    rdx=0000000000012749 rsi=0000000000000000 rdi=0000000000000000
    rip=fffff80002f2df9f rsp=fffff880027fb670 rbp=fffffa80237a5f20
     r8=000000000009732a  r9=0000000000000001 r10=0000000000000042
    r11=0000058000000000 r12=0000000000000000 r13=0000000000000000
    r14=0000000000000000 r15=0000000000000000
    iopl=0         nv up ei ng nz na pe nc
    nt!MiIdentifyPfn+0x23f:
    fffff800`02f2df9f 4c8b7500        mov     r14,qword ptr [rbp] ss:0018:fffffa80`237a5f20=????????????????
    Resetting default scope
    LAST_CONTROL_TRANSFER:  from fffff80002e821e9 to fffff80002e82c40
    STACK_TEXT:  
    fffff880`027fb398 fffff800`02e821e9 : 00000000`0000000a fffffa80`237a5f20 00000000`00000002 00000000`00000000 : nt!KeBugCheckEx
    fffff880`027fb3a0 fffff800`02e80e60 : 00000000`42506650 00000000`00000000 00000000`00000000 0200c600`00087334 : nt!KiBugCheckDispatch+0x69
    fffff880`027fb4e0 fffff800`02f2df9f : 00000000`00000000 02000000`00018290 00000000`42506600 fffff800`0316e73f : nt!KiPageFault+0x260
    fffff880`027fb670 fffff800`02f2ec7b : 00000000`00000000 00000000`00000004 fffffa80`05440660 fffffa80`0543f000 : nt!MiIdentifyPfn+0x23f
    fffff880`027fb710 fffff800`032937e5 : fffffa80`0543f000 fffff880`027fbca0 fffff880`027fb7e8 00000000`00000000 : nt!MmQueryPfnList+0xbb
    fffff880`027fb750 fffff800`031d64c8 : 00000000`00000006 00000000`00000000 fffffa80`0543f000 00000000`00000001 : nt!PfpPfnPrioRequest+0x115
    fffff880`027fb7a0 fffff800`0318cbd3 : 00000000`00000000 00000000`00000000 00000000`64496d4d 00000000`64496d01 : nt! ?? ::NNGAKEGL::`string'+0x4810d
    fffff880`027fb830 fffff800`0318d449 : 00000000`0168ba88 fffff800`02e85552 00000000`0168bae0 00000000`0168baa8 : nt!ExpQuerySystemInformation+0x1193
    fffff880`027fbbe0 fffff800`02e81ed3 : fffffa80`05f69b60 00000000`02609c90 00000000`02609c90 00000000`0168cfc0 : nt!NtQuerySystemInformation+0x4d
    fffff880`027fbc20 00000000`773d167a : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x13
    00000000`0168b9b8 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x773d167a
    STACK_COMMAND:  kb
    FOLLOWUP_IP: 
    nt!MiIdentifyPfn+23f
    fffff800`02f2df9f 4c8b7500        mov     r14,qword ptr [rbp]
    SYMBOL_STACK_INDEX:  3
    SYMBOL_NAME:  nt!MiIdentifyPfn+23f
    FOLLOWUP_NAME:  MachineOwner
    MODULE_NAME: nt
    DEBUG_FLR_IMAGE_TIMESTAMP:  4e02aaa3
    IMAGE_NAME:  memory_corruption
    FAILURE_BUCKET_ID:  X64_0xA_nt!MiIdentifyPfn+23f
    BUCKET_ID:  X64_0xA_nt!MiIdentifyPfn+23f
    Followup: MachineOwner
    ---------
    --------------------------------------------------------
    Please start by that:
    • Run memtest86+ to check that all is okay with your RAM. If an error was detected then replace the faulty RAM or contact your manufacturer Technical Support
    • Uninstall all unused programs
    • Update all possible drivers
    • Run msconfig and disable all startup items except Microsoft ones. Also, disable all services that you don't use

     

    You can also contact Microsoft CSS.

     


    This posting is provided "AS IS" with no warranties or guarantees , and confers no rights.

    Microsoft Student Partner 2010 / 2011
    Microsoft Certified Professional
    Microsoft Certified Systems Administrator: Security
    Microsoft Certified Systems Engineer: Security
    Microsoft Certified Technology Specialist: Windows Server 2008 Active Directory, Configuration
    Microsoft Certified Technology Specialist: Windows Server 2008 Network Infrastructure, Configuration
    Microsoft Certified Technology Specialist: Windows Server 2008 Applications Infrastructure, Configuration
    Microsoft Certified Technology Specialist: Windows 7, Configuring
    Microsoft Certified IT Professional: Enterprise Administrator
    Microsoft Certified IT Professional: Server Administrator
    Microsoft Certified Trainer

    • Marked as answer by Juke Chou Sunday, December 4, 2011 7:59 AM
    Thursday, November 17, 2011 9:41 PM