Bsod

Discussion in 'Software' started by Pielo, Aug 20, 2013.

  1. Pielo

    Pielo Private E-2

    I have tried a lot of things hopefully getting something to work, but haven't been too successful.

    Below is the dump from winDBG
    I have done a chkdsk /r /f on 3 of my drives two were clean and the 3rd picked up a few errors which did get fixed. However, the 3rd drive (i believe is my E drive when I do it) takes about 20 hours from what i calculated.

    I ran a memory check about 4 cycles? and came up clean, no errors. Since the problem originally started I had reimaged my computer back with windows 7 and that had not fixed the problem. I was looking into replacing some of the hardware , ie CPU and motherboard if this problem continued.

    Also updated my graphics card to the latest driver.

    Any suggestions would be helpful.
     
    Last edited by a moderator: Aug 21, 2013
  2. LauraR

    LauraR MajorGeeks Super-Duper Administrator Staff Member

    Hi and welcome. Please do not put a log inside a post. We require that you attach them:

    Use the paper clip icon within a post and browse your computer until you find the file.
     
  3. Pielo

    Pielo Private E-2

    attached 2 documents. Both happened yesterday.

    Is there any reason why a browser would cause a bsod.
    I think that is the reason.
     

    Attached Files:

  4. satrow

    satrow Major Geek Extraordinaire

    It's probably caused by a driver, copy all recent dmp files to your Desktop, zip and attach them.
     
  5. Pielo

    Pielo Private E-2

    Attached are all 6 .dmp files
     

    Attached Files:

  6. Pielo

    Pielo Private E-2

    Another time happened. Playing league of legends, while listening to pandora on chrome (before it was firefox)
     

    Attached Files:

  7. satrow

    satrow Major Geek Extraordinaire

    No 3rd party driver listed in any of the crash dump stats, 2x 'bad' drivers loaded that need updating:
    nusb3hub.sys Fri Jan 22 03:22:18 2010 (4B5919EA)
    NEC Electronics USB 3.0 Host Controller Driver (previous BSOD issues with 2010 and earlier versions)
    http://www.carrona.org/drivers/driver.php?id=nusb3hub.sys

    nusb3xhc.sys Fri Jan 22 03:22:21 2010 (4B5919ED)
    NEC Electronics USB 3.0 Host Controller Driver (previous BSOD issues with 2010 and earlier versions)
    http://www.carrona.org/drivers/driver.php?id=nusb3xhc.sys

    Also, the 2x during boot up crashes may have been triggered by HDTunePro and/or Smart Defrag clashing, turn off Smart Defrag at boot time and disallow HDTunePro from launching automatically.
     
  8. Pielo

    Pielo Private E-2

    That did not work. Updated the NEC controller 3.0
     

    Attached Files:

  9. satrow

    satrow Major Geek Extraordinaire

    The NEC USB3 drivers are still of the dodgy 2010 vintage. SmartDefragDriver is still loading.

    RTCore64.sys Wed May 25 07:39:12 2005 (42941D90)
    RivaTuner/EVGA Precision/MSI Afterburner (known BSOD issues w/Win7)
    http://www.carrona.org/drivers/driver.php?id=RTCore64.sys

    Afterburner/Precision needs uninstalling.

    Both crashes appear to have the same cause:
    Code:
    2: kd> !analyze -v; !sysinfo cpuspeed; !sysinfo SMBIOS; lmtsmn; q
    *******************************************************************************
    *                                                                             *
    *                        Bugcheck Analysis                                    *
    *                                                                             *
    *******************************************************************************
    
    IRQL_NOT_LESS_OR_EQUAL (a)
    An attempt was made to access a pageable (or completely invalid) address at an
    interrupt request level (IRQL) that is too high.  This is usually
    caused by drivers using improper addresses.
    If a kernel debugger is available get the stack backtrace.
    Arguments:
    Arg1: 00000000437872dc, memory referenced
    Arg2: 0000000000000002, IRQL
    Arg3: 0000000000000001, bitfield :
    	bit 0 : value 0 = read operation, 1 = write operation
    	bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
    Arg4: fffff800034af666, address which referenced memory
    
    Debugging Details:
    ------------------
    
    
    WRITE_ADDRESS: GetPointerFromAddress: unable to read from fffff80003706100
     00000000437872dc 
    
    CURRENT_IRQL:  2
    
    FAULTING_IP: 
    nt!KeInsertQueueApc+42
    fffff800`034af666 f0480fbaab8800000000 lock bts qword ptr [rbx+88h],0
    
    CUSTOMER_CRASH_COUNT:  1
    
    DEFAULT_BUCKET_ID:  VISTA_DRIVER_FAULT
    
    BUGCHECK_STR:  0xA
    
    PROCESS_NAME:  svchost.exe
    
    TRAP_FRAME:  fffff880031bd8d0 -- (.trap 0xfffff880031bd8d0)
    .trap 0xfffff880031bd8d0
    NOTE: The trap frame does not contain all registers.
    Some register values may be zeroed or incorrect.
    rax=0000000000000002 rbx=0000000000000000 rcx=fffffa800a8a2930
    rdx=0000000000000000 rsi=0000000000000000 rdi=0000000000000000
    rip=fffff800034af666 rsp=fffff880031bda60 rbp=0000000000000000
     r8=0000000000000000  r9=0000000000000000 r10=fffff88002f64c40
    r11=fffff880031bda70 r12=0000000000000000 r13=0000000000000000
    r14=0000000000000000 r15=0000000000000000
    iopl=0         nv up ei ng nz na po nc
    nt!KeInsertQueueApc+0x42:
    fffff800`034af666 f0480fbaab8800000000 lock bts qword ptr [rbx+88h],0 ds:0dd0:00000000`00000088=????????????????
    .trap
    Resetting default scope
    
    LAST_CONTROL_TRANSFER:  from fffff800034ce1a9 to fffff800034cec00
    
    STACK_TEXT:  
    fffff880`031bd788 fffff800`034ce1a9 : 00000000`0000000a 00000000`437872dc 00000000`00000002 00000000`00000001 : nt!KeBugCheckEx
    fffff880`031bd790 fffff800`034cce20 : 0000007f`fffffff8 00000000`00000040 fffff880`031bd970 00000000`43787254 : nt!KiBugCheckDispatch+0x69
    fffff880`031bd8d0 fffff800`034af666 : 00000000`00020000 00000000`00000058 ffffffff`80000dd0 00000000`000201f7 : nt!KiPageFault+0x260
    fffff880`031bda60 fffffa80`0b23edf3 : fffffa80`0d76a010 fffff880`031bdbc0 00000000`00000058 fffffa80`0d76a06c : nt!KeInsertQueueApc+0x42
    fffff880`031bdac0 fffffa80`0d76a010 : fffff880`031bdbc0 00000000`00000058 fffffa80`0d76a06c 00000000`00000000 : 0xfffffa80`0b23edf3
    fffff880`031bdac8 fffff880`031bdbc0 : 00000000`00000058 fffffa80`0d76a06c 00000000`00000000 ffffffff`fff7fbb0 : 0xfffffa80`0d76a010
    fffff880`031bdad0 00000000`00000058 : fffffa80`0d76a06c 00000000`00000000 ffffffff`fff7fbb0 fffff880`00000001 : 0xfffff880`031bdbc0
    fffff880`031bdad8 fffffa80`0d76a06c : 00000000`00000000 ffffffff`fff7fbb0 fffff880`00000001 00000000`00020000 : 0x58
    fffff880`031bdae0 00000000`00000000 : ffffffff`fff7fbb0 fffff880`00000001 00000000`00020000 00000000`00100000 : 0xfffffa80`0d76a06c
    
    
    STACK_COMMAND:  kb
    
    FOLLOWUP_IP: 
    nt!KeInsertQueueApc+42
    fffff800`034af666 f0480fbaab8800000000 lock bts qword ptr [rbx+88h],0
    
    SYMBOL_STACK_INDEX:  3
    
    SYMBOL_NAME:  nt!KeInsertQueueApc+42
    
    FOLLOWUP_NAME:  MachineOwner
    
    MODULE_NAME: nt
    
    IMAGE_NAME:  ntkrnlmp.exe
    
    DEBUG_FLR_IMAGE_TIMESTAMP:  5147d9c6
    
    FAILURE_BUCKET_ID:  X64_0xA_nt!KeInsertQueueApc+42
    
    BUCKET_ID:  X64_0xA_nt!KeInsertQueueApc+42
    
    Followup: MachineOwner
    ---------
    
    
    0: kd> !analyze -v; !sysinfo cpuspeed; !sysinfo SMBIOS; lmtsmn; q
    *******************************************************************************
    *                                                                             *
    *                        Bugcheck Analysis                                    *
    *                                                                             *
    *******************************************************************************
    
    IRQL_NOT_LESS_OR_EQUAL (a)
    An attempt was made to access a pageable (or completely invalid) address at an
    interrupt request level (IRQL) that is too high.  This is usually
    caused by drivers using improper addresses.
    If a kernel debugger is available get the stack backtrace.
    Arguments:
    Arg1: 0000000000000088, memory referenced
    Arg2: 0000000000000002, IRQL
    Arg3: 0000000000000001, bitfield :
    	bit 0 : value 0 = read operation, 1 = write operation
    	bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
    Arg4: fffff8000346c666, address which referenced memory
    
    Debugging Details:
    ------------------
    
    
    WRITE_ADDRESS: GetPointerFromAddress: unable to read from fffff800036c3100
     0000000000000088 
    
    CURRENT_IRQL:  2
    
    FAULTING_IP: 
    nt!KeInsertQueueApc+42
    fffff800`0346c666 f0480fbaab8800000000 lock bts qword ptr [rbx+88h],0
    
    CUSTOMER_CRASH_COUNT:  1
    
    DEFAULT_BUCKET_ID:  VISTA_DRIVER_FAULT
    
    BUGCHECK_STR:  0xA
    
    PROCESS_NAME:  svchost.exe
    
    TRAP_FRAME:  fffff880031a18d0 -- (.trap 0xfffff880031a18d0)
    .trap 0xfffff880031a18d0
    NOTE: The trap frame does not contain all registers.
    Some register values may be zeroed or incorrect.
    rax=0000000000000002 rbx=0000000000000000 rcx=fffffa800ee47a70
    rdx=0000000000000000 rsi=0000000000000000 rdi=0000000000000000
    rip=fffff8000346c666 rsp=fffff880031a1a60 rbp=0000000000000000
     r8=0000000000000000  r9=0000000000000000 r10=fffff80003607940
    r11=fffff880031a1a70 r12=0000000000000000 r13=0000000000000000
    r14=0000000000000000 r15=0000000000000000
    iopl=0         nv up ei ng nz na po nc
    nt!KeInsertQueueApc+0x42:
    fffff800`0346c666 f0480fbaab8800000000 lock bts qword ptr [rbx+88h],0 ds:0a78:00000000`00000088=????????????????
    .trap
    Resetting default scope
    
    LAST_CONTROL_TRANSFER:  from fffff8000348b1a9 to fffff8000348bc00
    
    STACK_TEXT:  
    fffff880`031a1788 fffff800`0348b1a9 : 00000000`0000000a 00000000`00000088 00000000`00000002 00000000`00000001 : nt!KeBugCheckEx
    fffff880`031a1790 fffff800`03489e20 : 0000007f`fffffff8 00000000`00000040 fffff880`031a1970 00000000`00000000 : nt!KiBugCheckDispatch+0x69
    fffff880`031a18d0 fffff800`0346c666 : 00000000`00000000 00000000`00000058 ffffffff`80000a78 00000000`00031000 : nt!KiPageFault+0x260
    fffff880`031a1a60 fffffa80`0b19cdf3 : fffffa80`0f613670 fffff880`031a1bc0 00000000`00000058 fffffa80`0f6136cc : nt!KeInsertQueueApc+0x42
    fffff880`031a1ac0 fffffa80`0f613670 : fffff880`031a1bc0 00000000`00000058 fffffa80`0f6136cc 00000000`00000000 : 0xfffffa80`0b19cdf3
    fffff880`031a1ac8 fffff880`031a1bc0 : 00000000`00000058 fffffa80`0f6136cc 00000000`00000000 00000000`00030128 : 0xfffffa80`0f613670
    fffff880`031a1ad0 00000000`00000058 : fffffa80`0f6136cc 00000000`00000000 00000000`00030128 fffff880`00000001 : 0xfffff880`031a1bc0
    fffff880`031a1ad8 fffffa80`0f6136cc : 00000000`00000000 00000000`00030128 fffff880`00000001 00000000`00030000 : 0x58
    fffff880`031a1ae0 00000000`00000000 : 00000000`00030128 fffff880`00000001 00000000`00030000 fffffa80`00100000 : 0xfffffa80`0f6136cc
    
    
    STACK_COMMAND:  kb
    
    FOLLOWUP_IP: 
    nt!KeInsertQueueApc+42
    fffff800`0346c666 f0480fbaab8800000000 lock bts qword ptr [rbx+88h],0
    
    SYMBOL_STACK_INDEX:  3
    
    SYMBOL_NAME:  nt!KeInsertQueueApc+42
    
    FOLLOWUP_NAME:  MachineOwner
    
    MODULE_NAME: nt
    
    IMAGE_NAME:  ntkrnlmp.exe
    
    DEBUG_FLR_IMAGE_TIMESTAMP:  5147d9c6
    
    FAILURE_BUCKET_ID:  X64_0xA_nt!KeInsertQueueApc+42
    
    BUCKET_ID:  X64_0xA_nt!KeInsertQueueApc+42
    
    Followup: MachineOwner
    ---------
     
  10. Pielo

    Pielo Private E-2

    removed smart defrag, usb 3.0, and msi afterburner. will report if anything else happens.
     
  11. Pielo

    Pielo Private E-2

    another 1: watching a random video on the web
     

    Attached Files:

  12. satrow

    satrow Major Geek Extraordinaire

  13. Pielo

    Pielo Private E-2

    Will try. Thanks!
     
  14. Pielo

    Pielo Private E-2

    Attached the Verifier Query - also when I tried system restoring to the one created before the verifier it gave me an instruction at 759a9c72 referenced at 759a9c72.
     

    Attached Files:

    Last edited: Sep 6, 2013
  15. satrow

    satrow Major Geek Extraordinaire

    I'm unsure of what you're saying here.

    The crash is verified but no 3rd party driver is named or given in the Stack text, that's frequently a sign of hardware error; 0xF4 is often SSD/HDD or closely related.

    Code:
    1: kd> !analyze -v; !sysinfo cpuspeed; !sysinfo SMBIOS; lmtsmn; q
    *******************************************************************************
    *                                                                             *
    *                        Bugcheck Analysis                                    *
    *                                                                             *
    *******************************************************************************
    
    CRITICAL_OBJECT_TERMINATION (f4)
    A process or thread crucial to system operation has unexpectedly exited or been
    terminated.
    Several processes and threads are necessary for the operation of the
    system; when they are terminated (for any reason), the system can no
    longer function.
    Arguments:
    Arg1: 0000000000000003, Process
    Arg2: fffffa800cf93730, Terminating object
    Arg3: fffffa800cf93a10, Process image file name
    Arg4: fffff800037da350, Explanatory message (ascii)
    
    Debugging Details:
    ------------------
    
    
    PROCESS_OBJECT: fffffa800cf93730
    
    IMAGE_NAME:  wininit.exe
    
    DEBUG_FLR_IMAGE_TIMESTAMP:  0
    
    MODULE_NAME: wininit
    
    FAULTING_MODULE: 0000000000000000 
    
    PROCESS_NAME:  wininit.exe
    
    EXCEPTION_CODE: (NTSTATUS) 0xc0000006 - The instruction at 0x%p referenced memory at 0x%p. The required data was not placed into memory because of an I/O error status of 0x%x.
    
    BUGCHECK_STR:  0xF4_IOERR
    
    CUSTOMER_CRASH_COUNT:  1
    
    DEFAULT_BUCKET_ID:  VERIFIER_ENABLED_VISTA_MINIDUMP
    
    CURRENT_IRQL:  0
    
    STACK_TEXT:  
    fffff880`026140e8 fffff800`03861d22 : 00000000`000000f4 00000000`00000003 fffffa80`0cf93730 fffffa80`0cf93a10 : nt!KeBugCheckEx
    fffff880`026140f0 fffff800`0380e08b : ffffffff`ffffffff fffffa80`0d225870 fffffa80`0cf93730 fffff800`0378d834 : nt!PspCatchCriticalBreak+0x92
    fffff880`02614130 fffff800`0378e144 : ffffffff`ffffffff 00000000`00000001 fffffa80`0cf93730 00000000`00000008 : nt! ?? ::NNGAKEGL::`string'+0x17486
    fffff880`02614180 fffff800`034d2e93 : fffffa80`0cf93730 fffff800`c0000006 fffffa80`0d225870 00000000`80010001 : nt!NtTerminateProcess+0xf4
    fffff880`02614200 fffff800`034cf450 : fffff800`0351e81f fffff880`02614b78 fffff880`026148d0 fffff880`02614c20 : nt!KiSystemServiceCopyEnd+0x13
    fffff880`02614398 fffff800`0351e81f : fffff880`02614b78 fffff880`026148d0 fffff880`02614c20 00000000`ffbbb938 : nt!KiServiceLinkage
    fffff880`026143a0 fffff800`034d3282 : fffff880`02614b78 00000000`02a60000 fffff880`02614c20 00000000`ffbbf894 : nt! ?? ::FNODOBFM::`string'+0x488e4
    fffff880`02614a40 fffff800`034d1dfa : 00000000`00000000 00000000`ffbaec6c 00000000`77588d01 00000000`02a60000 : nt!KiExceptionDispatch+0xc2
    fffff880`02614c20 00000000`77478f55 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiPageFault+0x23a
    00000000`029e1230 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x77478f55
    
    
    STACK_COMMAND:  kb
    
    FOLLOWUP_NAME:  MachineOwner
    
    FAILURE_BUCKET_ID:  X64_0xF4_IOERR_VRF_IMAGE_wininit.exe
    
    BUCKET_ID:  X64_0xF4_IOERR_VRF_IMAGE_wininit.exe
    
    Followup: MachineOwner
     

MajorGeeks.Com Menu

Downloads All In One Tweaks \ Android \ Anti-Malware \ Anti-Virus \ Appearance \ Backup \ Browsers \ CD\DVD\Blu-Ray \ Covert Ops \ Drive Utilities \ Drivers \ Graphics \ Internet Tools \ Multimedia \ Networking \ Office Tools \ PC Games \ System Tools \ Mac/Apple/Ipad Downloads

Other News: Top Downloads \ News (Tech) \ Off Base (Other Websites News) \ Way Off Base (Offbeat Stories and Pics)

Social: Facebook \ YouTube \ Twitter \ Tumblr \ Pintrest \ RSS Feeds