locked
BSOD Win 7 64 Bit RRS feed

  • Question

  • Ever since I installed Window 7 64 Bit on a custom build, have been getting BSOD's at an average of 2 per day at least.  I was thinking it was a driver problem and have updated my ATI Display drivers.  Please find the minidumps loaded to skydrive.  Please let me know if you need additional information.

     

     

    http://cid-1eae48bfd36fe005.skydrive.live.com/redir.aspx?resid=1EAE48BFD36FE005!248


    Any help would be much appreciated as I at my wits end.
    Sunday, June 19, 2011 9:17 PM

Answers

  • *******************************************************************************
    *                                                                             *
    *                        Bugcheck Analysis                                    *
    *                                                                             *
    *******************************************************************************
    IRQL_NOT_LESS_OR_EQUAL (a)
    An attempt was made to access a pageable (or completely invalid) address at an
    interrupt request level (IRQL) that is too high.  This is usually
    caused by drivers using improper addresses.
    If a kernel debugger is available get the stack backtrace.
    Arguments:
    Arg1: 0000000000000002, memory referenced
    Arg2: 0000000000000002, IRQL
    Arg3: 0000000000000000, bitfield :
    bit 0 : value 0 = read operation, 1 = write operation
    bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
    Arg4: fffff80002aad4fe, address which referenced memory
    Debugging Details:
    ------------------
    READ_ADDRESS: GetPointerFromAddress: unable to read from fffff80002cc8100
     0000000000000002 
    CURRENT_IRQL:  2
    FAULTING_IP: 
    nt!IopQueueThreadIrp+8e
    fffff800`02aad4fe 4c8b6c2440      mov     r13,qword ptr [rsp+40h]
    CUSTOMER_CRASH_COUNT:  1
    DEFAULT_BUCKET_ID:  VISTA_DRIVER_FAULT
    BUGCHECK_STR:  0xA
    PROCESS_NAME:  ccsvchst.exe
    TRAP_FRAME:  fffff88007665840 -- (.trap 0xfffff88007665840)
    NOTE: The trap frame does not contain all registers.
    Some register values may be zeroed or incorrect.
    rax=0000000000000002 rbx=0000000000000000 rcx=0000000000000000
    rdx=0000000000000000 rsi=0000000000000000 rdi=0000000000000000
    rip=fffff80002aad4fe rsp=fffff880076659d0 rbp=fffffa8005cc6f48
     r8=0000000000000000  r9=0000000000000000 r10=fffffa8003758b70
    r11=0000000000000006 r12=0000000000000000 r13=0000000000000000
    r14=0000000000000000 r15=0000000000000000
    iopl=0         nv up ei pl nz na po nc
    nt!IopQueueThreadIrp+0x8e:
    fffff800`02aad4fe 4c8b6c2440      mov     r13,qword ptr [rsp+40h] ss:0018:fffff880`07665a10=fffffa8003e45de0
    Resetting default scope
    LAST_CONTROL_TRANSFER:  from fffff80002a982a9 to fffff80002a98d00
    STACK_TEXT:  
    fffff880`076656f8 fffff800`02a982a9 : 00000000`0000000a 00000000`00000002 00000000`00000002 00000000`00000000 : nt!KeBugCheckEx
    fffff880`07665700 fffff800`02a96f20 : fffff800`02d98c60 00000000`0000003f 00000000`00000000 fffffa80`05cc6b60 : nt!KiBugCheckDispatch+0x69
    fffff880`07665840 fffff800`02aad4fe : fffff8a0`027da190 fffffa80`03e45de0 00000000`00000000 fffffa80`04dc7490 : nt!KiPageFault+0x260
    fffff880`076659d0 fffff800`02da007c : 00000000`00000000 fffffa80`05d49800 00000000`00000000 fffffa80`04dc7490 : nt!IopQueueThreadIrp+0x8e
    fffff880`07665a30 fffff800`02d8f844 : 00000000`00000000 fffffa80`05d49800 00000000`00002180 fffffa80`05c32430 : nt!IopCloseFile+0xfc
    fffff880`07665ac0 fffff800`02d8f601 : fffffa80`05d49800 fffffa80`00000001 fffff8a0`027da190 00000000`00000000 : nt!ObpDecrementHandleCount+0xb4
    fffff880`07665b40 fffff800`02d8fbc4 : 00000000`00002180 fffffa80`05d49800 fffff8a0`027da190 00000000`00002180 : nt!ObpCloseHandleTableEntry+0xb1
    fffff880`07665bd0 fffff800`02a97f93 : fffffa80`05cc6b60 fffff880`07665ca0 00000000`7eebb000 fffffa80`04e6d610 : nt!ObpCloseHandle+0x94
    fffff880`07665c20 00000000`77a7140a : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x13
    00000000`153ee808 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x77a7140a
    STACK_COMMAND:  kb
    FOLLOWUP_IP: 
    nt!IopQueueThreadIrp+8e
    fffff800`02aad4fe 4c8b6c2440      mov     r13,qword ptr [rsp+40h]
    SYMBOL_STACK_INDEX:  3
    SYMBOL_NAME:  nt!IopQueueThreadIrp+8e
    FOLLOWUP_NAME:  MachineOwner
    MODULE_NAME: nt
    IMAGE_NAME:  ntkrnlmp.exe
    DEBUG_FLR_IMAGE_TIMESTAMP:  4d9fdd5b
    FAILURE_BUCKET_ID:  X64_0xA_nt!IopQueueThreadIrp+8e
    BUCKET_ID:  X64_0xA_nt!IopQueueThreadIrp+8e
    Followup: MachineOwner
    -----------------------------------------------------------------------------------------------------------------
    I analyzed the last dump file and I am unable to determine the exact cause from the minidump.
    Please proceed like that: 
    • Update all possible drivers / firmwares/BIOS
    • Run memtest86+ to check that all is okay with your RAM. If errors were detected then replace the faulty RAM
    • Uninstall all unwanted programs and especially recently installed ones
    • Perform a full scan on your disks and uninstall all malware programs

    You can also contact Microsoft CSS.

    If the problem persists, disable all security softwares and check again.

     

     


    This posting is provided "AS IS" with no warranties or guarantees , and confers no rights.

    Microsoft Student Partner 2010 / 2011
    Microsoft Certified Professional
    Microsoft Certified Systems Administrator: Security
    Microsoft Certified Systems Engineer: Security
    Microsoft Certified Technology Specialist: Windows Server 2008 Active Directory, Configuration
    Microsoft Certified Technology Specialist: Windows Server 2008 Network Infrastructure, Configuration
    Microsoft Certified Technology Specialist: Windows Server 2008 Applications Infrastructure, Configuration
    Microsoft Certified Technology Specialist: Windows 7, Configuring
    Microsoft Certified IT Professional: Enterprise Administrator

    • Proposed as answer by Niki Han Monday, June 27, 2011 9:22 AM
    • Marked as answer by Niki Han Friday, July 8, 2011 10:10 AM
    Sunday, June 19, 2011 9:49 PM

All replies

  • *******************************************************************************
    *                                                                             *
    *                        Bugcheck Analysis                                    *
    *                                                                             *
    *******************************************************************************
    IRQL_NOT_LESS_OR_EQUAL (a)
    An attempt was made to access a pageable (or completely invalid) address at an
    interrupt request level (IRQL) that is too high.  This is usually
    caused by drivers using improper addresses.
    If a kernel debugger is available get the stack backtrace.
    Arguments:
    Arg1: 0000000000000002, memory referenced
    Arg2: 0000000000000002, IRQL
    Arg3: 0000000000000000, bitfield :
    bit 0 : value 0 = read operation, 1 = write operation
    bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
    Arg4: fffff80002aad4fe, address which referenced memory
    Debugging Details:
    ------------------
    READ_ADDRESS: GetPointerFromAddress: unable to read from fffff80002cc8100
     0000000000000002 
    CURRENT_IRQL:  2
    FAULTING_IP: 
    nt!IopQueueThreadIrp+8e
    fffff800`02aad4fe 4c8b6c2440      mov     r13,qword ptr [rsp+40h]
    CUSTOMER_CRASH_COUNT:  1
    DEFAULT_BUCKET_ID:  VISTA_DRIVER_FAULT
    BUGCHECK_STR:  0xA
    PROCESS_NAME:  ccsvchst.exe
    TRAP_FRAME:  fffff88007665840 -- (.trap 0xfffff88007665840)
    NOTE: The trap frame does not contain all registers.
    Some register values may be zeroed or incorrect.
    rax=0000000000000002 rbx=0000000000000000 rcx=0000000000000000
    rdx=0000000000000000 rsi=0000000000000000 rdi=0000000000000000
    rip=fffff80002aad4fe rsp=fffff880076659d0 rbp=fffffa8005cc6f48
     r8=0000000000000000  r9=0000000000000000 r10=fffffa8003758b70
    r11=0000000000000006 r12=0000000000000000 r13=0000000000000000
    r14=0000000000000000 r15=0000000000000000
    iopl=0         nv up ei pl nz na po nc
    nt!IopQueueThreadIrp+0x8e:
    fffff800`02aad4fe 4c8b6c2440      mov     r13,qword ptr [rsp+40h] ss:0018:fffff880`07665a10=fffffa8003e45de0
    Resetting default scope
    LAST_CONTROL_TRANSFER:  from fffff80002a982a9 to fffff80002a98d00
    STACK_TEXT:  
    fffff880`076656f8 fffff800`02a982a9 : 00000000`0000000a 00000000`00000002 00000000`00000002 00000000`00000000 : nt!KeBugCheckEx
    fffff880`07665700 fffff800`02a96f20 : fffff800`02d98c60 00000000`0000003f 00000000`00000000 fffffa80`05cc6b60 : nt!KiBugCheckDispatch+0x69
    fffff880`07665840 fffff800`02aad4fe : fffff8a0`027da190 fffffa80`03e45de0 00000000`00000000 fffffa80`04dc7490 : nt!KiPageFault+0x260
    fffff880`076659d0 fffff800`02da007c : 00000000`00000000 fffffa80`05d49800 00000000`00000000 fffffa80`04dc7490 : nt!IopQueueThreadIrp+0x8e
    fffff880`07665a30 fffff800`02d8f844 : 00000000`00000000 fffffa80`05d49800 00000000`00002180 fffffa80`05c32430 : nt!IopCloseFile+0xfc
    fffff880`07665ac0 fffff800`02d8f601 : fffffa80`05d49800 fffffa80`00000001 fffff8a0`027da190 00000000`00000000 : nt!ObpDecrementHandleCount+0xb4
    fffff880`07665b40 fffff800`02d8fbc4 : 00000000`00002180 fffffa80`05d49800 fffff8a0`027da190 00000000`00002180 : nt!ObpCloseHandleTableEntry+0xb1
    fffff880`07665bd0 fffff800`02a97f93 : fffffa80`05cc6b60 fffff880`07665ca0 00000000`7eebb000 fffffa80`04e6d610 : nt!ObpCloseHandle+0x94
    fffff880`07665c20 00000000`77a7140a : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x13
    00000000`153ee808 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x77a7140a
    STACK_COMMAND:  kb
    FOLLOWUP_IP: 
    nt!IopQueueThreadIrp+8e
    fffff800`02aad4fe 4c8b6c2440      mov     r13,qword ptr [rsp+40h]
    SYMBOL_STACK_INDEX:  3
    SYMBOL_NAME:  nt!IopQueueThreadIrp+8e
    FOLLOWUP_NAME:  MachineOwner
    MODULE_NAME: nt
    IMAGE_NAME:  ntkrnlmp.exe
    DEBUG_FLR_IMAGE_TIMESTAMP:  4d9fdd5b
    FAILURE_BUCKET_ID:  X64_0xA_nt!IopQueueThreadIrp+8e
    BUCKET_ID:  X64_0xA_nt!IopQueueThreadIrp+8e
    Followup: MachineOwner
    -----------------------------------------------------------------------------------------------------------------
    I analyzed the last dump file and I am unable to determine the exact cause from the minidump.
    Please proceed like that: 
    • Update all possible drivers / firmwares/BIOS
    • Run memtest86+ to check that all is okay with your RAM. If errors were detected then replace the faulty RAM
    • Uninstall all unwanted programs and especially recently installed ones
    • Perform a full scan on your disks and uninstall all malware programs

    You can also contact Microsoft CSS.

    If the problem persists, disable all security softwares and check again.

     

     


    This posting is provided "AS IS" with no warranties or guarantees , and confers no rights.

    Microsoft Student Partner 2010 / 2011
    Microsoft Certified Professional
    Microsoft Certified Systems Administrator: Security
    Microsoft Certified Systems Engineer: Security
    Microsoft Certified Technology Specialist: Windows Server 2008 Active Directory, Configuration
    Microsoft Certified Technology Specialist: Windows Server 2008 Network Infrastructure, Configuration
    Microsoft Certified Technology Specialist: Windows Server 2008 Applications Infrastructure, Configuration
    Microsoft Certified Technology Specialist: Windows 7, Configuring
    Microsoft Certified IT Professional: Enterprise Administrator

    • Proposed as answer by Niki Han Monday, June 27, 2011 9:22 AM
    • Marked as answer by Niki Han Friday, July 8, 2011 10:10 AM
    Sunday, June 19, 2011 9:49 PM
  • Mr X,

    Will check on the Memory if possible today and also follow your other instructions.  I am at work so I am not sure if I have the complete list of non-microsoft apps -  Carbonite, Norton, Adobe.  Diagnostic tools like Bluescreen view, HWinfo, radarsynch and slimdriver.  I will go home and check again today if possible. 

     

    Thanks for the effort, do let me know if you have any other suggestions.

    Tuesday, June 21, 2011 4:55 PM