Windows 7 Forums

Welcome to Windows 7 Forums. Our forum is dedicated to helping you find support and solutions for any problems regarding your Windows 7 PC be it Dell, HP, Acer, Asus or a custom build. We also provide an extensive Windows 7 tutorial section that covers a wide range of tips and tricks.


Windows 7: Random BSOD more prominent when under load with buzzing sound


23 Mar 2012   #1

Windows 7 Ultimate x64
 
 
Random BSOD more prominent when under load with buzzing sound

Hi guys, I am a first timer at this forum, but I got nowhere else to ask.

So basically, I built myself a new PC from scratch, ordered all the parts and everything. There is no chance of damage from static as I used a band when I assembled it. I've had it for a couple of months now and I have been getting BSODs from day one. I though I had isolated it to an old version of Lucid Virtu and DeamonTools, but I am a still getting the problem.

I have ran thorough checks, CHKDSK /f , got myself a copy of TuneUp Utilities, benchmarked using a couple of Futuremark's benchmarks, also tried Heaven and I even borrowed a copy of SiSoft Sandra from a friend. Furthermore I went ahead and ran a memtest86+ for about 1 hour and 30 min . All the tests were AOK and no BSODs during.

There is no alterations to the BIOS and everything is running at stock, and I crosschecked all my parts twice, everything is compatible. Although the machine still crashed even when completely idle. Also sometimes there is a buzzing noise with a temporary screen freeze every so often, sometimes seconds before a blue screen and sometimes hours before.

The system runs very cool with only 30 degrees Celsius past ambient when under full load. And with 10 or so when idle.

Therefore went ahead and tried driver verifier. It took good 8 hours of operational time but the machine finally crashed to BSOD.

Here are some of the messages after the crashes:

Crashed during Idle

Problem signature:
Problem Event Name: BlueScreen
OS Version: 6.1.7601.2.1.0.256.1
Locale ID: 1033

Additional information about the problem:
BCCode: 1e
BCP1: 0000000000000000
BCP2: 0000000000000000
BCP3: 0000000000000000
BCP4: 0000000000000000
OS Version: 6_1_7601
Service Pack: 1_0
Product: 256_1

Crashed during CS:S

Problem signature:
Problem Event Name: BlueScreen
OS Version: 6.1.7601.2.1.0.256.1
Locale ID: 1033

Additional information about the problem:
BCCode: 1a
BCP1: 0000000000005003
BCP2: FFFFF70001080000
BCP3: 000000000003EA30
BCP4: FFFFF680002B4962
OS Version: 6_1_7601
Service Pack: 1_0
Product: 256_1

Crashed during the running of the driver verifier

Problem signature:
Problem Event Name: BlueScreen
OS Version: 6.1.7601.2.1.0.256.1
Locale ID: 1033

Additional information about the problem:
BCCode: 24
BCP1: 00000000001904FB
BCP2: FFFFF880045A4338
BCP3: FFFFF880045A3B90
BCP4: FFFFF80002EC4B65
OS Version: 6_1_7601
Service Pack: 1_0
Product: 256_1


I normally would consider myself pretty tech savvy but I am out of options on this one. I have yet to reinstall Windows however as consider that to be turning the house to change a light bulb, and even if I do need to I would like to know what is causing the problem so I can then attend to the fault.

I am posting a zip file as requested by the pinned up thread. However the .zip includes 2 reports instead of 1, one before and one after the verifier ran.

I hope you guys can help me out!




My System SpecsSystem Spec
.

23 Mar 2012   #2

Windows 7 Ultimate x64
 
 

3 dumps, all core Windows files so it is more than likely those are not the cause of the crash itself. The verifier enabled dump(s) didn't show anything.

Run Memtest:

Quote:

Read the following to test your memory for errors.

Drivers that need to be updated:

Quote:
FNETURPX.SYS - Fri Oct 03 22:27:02 2008 (FNet Turbo HDD USB Driver - Also part of AsRock XFastUSB package). Update here, or here, or here.
Dumps for reference:

Code:
Microsoft (R) Windows Debugger Version 6.12.0002.633 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.


Loading Dump File [C:\Users\Icarus\Downloads\Windows_NT6_BSOD_jcgriff2 - Copy\032312-32604-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available

Symbol search path is: http://msdl.microsoft.com/download/symbols
Executable search path is: 
Windows 7 Kernel Version 7601 (Service Pack 1) MP (8 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS
Built by: 7601.17640.amd64fre.win7sp1_gdr.110622-1506
Machine Name:
Kernel base = 0xfffff800`02e50000 PsLoadedModuleList = 0xfffff800`03095670
Debug session time: Fri Mar 23 12:30:04.302 2012 (UTC - 4:00)
System Uptime: 0 days 0:33:16.083
Loading Kernel Symbols
...............................................................
................................................................
..............................
Loading User Symbols
Loading unloaded module list
.....
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

Use !analyze -v to get detailed debugging information.

BugCheck 24, {1904fb, fffff880045a4338, fffff880045a3b90, fffff80002ec4b65}

Probably caused by : Ntfs.sys ( Ntfs!NtfsCommonRead+1ff )

Followup: MachineOwner
---------

2: kd> !analyze -v
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

NTFS_FILE_SYSTEM (24)
    If you see NtfsExceptionFilter on the stack then the 2nd and 3rd
    parameters are the exception record and context record. Do a .cxr
    on the 3rd parameter and then kb to obtain a more informative stack
    trace.
Arguments:
Arg1: 00000000001904fb
Arg2: fffff880045a4338
Arg3: fffff880045a3b90
Arg4: fffff80002ec4b65

Debugging Details:
------------------


EXCEPTION_RECORD:  fffff880045a4338 -- (.exr 0xfffff880045a4338)
ExceptionAddress: fffff80002ec4b65 (nt!ExpInterlockedPopEntrySListFault16)
   ExceptionCode: c0000005 (Access violation)
  ExceptionFlags: 00000000
NumberParameters: 2
   Parameter[0]: 0000000000000000
   Parameter[1]: ffffffffffffffff
Attempt to read from address ffffffffffffffff

CONTEXT:  fffff880045a3b90 -- (.cxr 0xfffff880045a3b90)
rax=000000011e230003 rbx=fffff8a012fecc70 rcx=fffff88001264780
rdx=ff000000ff000001 rsi=fffff8a00279d280 rdi=fffff8a012fecb40
rip=fffff80002ec4b65 rsp=fffff880045a4570 rbp=fffff880045a4750
 r8=ff000000ff000000  r9=0000000000000000 r10=fffff88001264780
r11=fffffa8011bda9c8 r12=0000000040060401 r13=0000000000000001
r14=fffffa8011bdaa38 r15=fffffa8011bda9c0
iopl=0         nv up ei ng nz na po nc
cs=0010  ss=0018  ds=002b  es=002b  fs=0053  gs=002b             efl=00010286
nt!ExpInterlockedPopEntrySListFault16:
fffff800`02ec4b65 498b08          mov     rcx,qword ptr [r8] ds:002b:ff000000`ff000000=????????????????
Resetting default scope

CUSTOMER_CRASH_COUNT:  1

DEFAULT_BUCKET_ID:  VERIFIER_ENABLED_VISTA_MINIDUMP

PROCESS_NAME:  avp.exe

CURRENT_IRQL:  0

ERROR_CODE: (NTSTATUS) 0xc0000005 - The instruction at 0x%08lx referenced memory at 0x%08lx. The memory could not be %s.

EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - The instruction at 0x%08lx referenced memory at 0x%08lx. The memory could not be %s.

EXCEPTION_PARAMETER1:  0000000000000000

EXCEPTION_PARAMETER2:  ffffffffffffffff

READ_ADDRESS: GetPointerFromAddress: unable to read from fffff800030ff100
 ffffffffffffffff 

FOLLOWUP_IP: 
Ntfs!NtfsCommonRead+1ff
fffff880`01213a1f 4885c0          test    rax,rax

FAULTING_IP: 
nt!ExpInterlockedPopEntrySListFault16+0
fffff800`02ec4b65 498b08          mov     rcx,qword ptr [r8]

BUGCHECK_STR:  0x24

LAST_CONTROL_TRANSFER:  from fffff88001213a1f to fffff80002ec4b65

STACK_TEXT:  
fffff880`045a4570 fffff880`01213a1f : fffff880`045a4620 fffff880`01073aae fffffa80`0ea0e730 fffff880`045a46c0 : nt!ExpInterlockedPopEntrySListFault16
fffff880`045a4580 fffff880`01215a68 : fffffa80`11bda9c0 fffffa80`12358010 fffff880`045a4700 fffffa80`0ee6f001 : Ntfs!NtfsCommonRead+0x1ff
fffff880`045a4720 fffff800`03372c16 : fffffa80`12358010 fffffa80`12358010 fffffa80`0ee6f030 fffffa80`11b26b70 : Ntfs!NtfsFsdRead+0x1b8
fffff880`045a47d0 fffff880`01071bcf : fffffa80`12358368 fffff880`045a4880 fffffa80`1212c010 fffffa80`11b26b70 : nt!IovCallDriver+0x566
fffff880`045a4830 fffff880`010706df : fffffa80`0f007950 fffffa80`0f007950 fffffa80`0f007900 fffffa80`12358010 : fltmgr!FltpLegacyProcessingAfterPreCallbacksCompleted+0x24f
fffff880`045a48c0 fffff800`03372c16 : fffffa80`12358010 00000000`00000002 fffffa80`0ea0e730 fffffa80`0db35298 : fltmgr!FltpDispatch+0xcf
fffff880`045a4920 fffff800`02ef4bc5 : fffffa80`12358030 fffffa80`0f010c30 fffffa80`0f010b00 fffffa80`0ebc7d40 : nt!IovCallDriver+0x566
fffff880`045a4980 fffff800`03169417 : fffffa80`0f010b00 fffffa80`0f010b00 fffffa80`0ea0e732 fffffa80`0fc0c060 : nt!IoPageRead+0x255
fffff880`045a4a10 fffff800`03169511 : fffffa80`12267210 fffffa80`0fc0c060 fffff880`045a4b48 00000000`00000005 : nt!MiPfExecuteReadList+0xff
fffff880`045a4a70 fffff800`02ebbc8d : fffffa80`12267210 00000000`00000000 00000000`0000a000 00000000`00000000 : nt!MmPrefetchForCacheManager+0xb5
fffff880`045a4ac0 fffff800`031b6e10 : 00000000`00000000 00000000`00000000 fffffa80`0ea0e730 fffff8a0`12fce000 : nt!CcFetchDataForRead+0x17d
fffff880`045a4b20 fffff880`01213730 : fffff8a0`00000000 00000000`00000005 fffffa80`00040000 fffff880`01266001 : nt!CcCopyRead+0x180
fffff880`045a4be0 fffff880`01213da3 : 00000000`00000000 fffff8a0`12fecc70 fffff880`045a4e10 fffff8a0`12fecb40 : Ntfs!NtfsCachedRead+0x180
fffff880`045a4c40 fffff880`01215a68 : fffffa80`12127aa0 fffffa80`0ea9c010 fffff880`045a4e01 fffffa80`0ee6f000 : Ntfs!NtfsCommonRead+0x583
fffff880`045a4de0 fffff800`03372c16 : fffffa80`0ea9c010 fffffa80`0ea9c010 fffffa80`0ee6f030 fffffa80`11bc3c60 : Ntfs!NtfsFsdRead+0x1b8
fffff880`045a4e90 fffff880`01071bcf : fffffa80`0ea9c368 fffff880`045a4f40 fffffa80`12257530 fffffa80`11bc3c60 : nt!IovCallDriver+0x566
fffff880`045a4ef0 fffff880`01074aea : 00000000`00000000 00000000`00000000 00000000`00000000 fffffa80`12257530 : fltmgr!FltpLegacyProcessingAfterPreCallbacksCompleted+0x24f
fffff880`045a4f80 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : fltmgr!FltPerformSynchronousIo+0x2ca


SYMBOL_STACK_INDEX:  1

SYMBOL_NAME:  Ntfs!NtfsCommonRead+1ff

FOLLOWUP_NAME:  MachineOwner

MODULE_NAME: Ntfs

IMAGE_NAME:  Ntfs.sys

DEBUG_FLR_IMAGE_TIMESTAMP:  4d79997b

STACK_COMMAND:  .cxr 0xfffff880045a3b90 ; kb

FAILURE_BUCKET_ID:  X64_0x24_VRF_Ntfs!NtfsCommonRead+1ff

BUCKET_ID:  X64_0x24_VRF_Ntfs!NtfsCommonRead+1ff

Followup: MachineOwner
---------

2: kd> !thread
GetPointerFromAddress: unable to read from fffff800030ff000
THREAD fffffa800fc0c060  Cid 0784.0524  Teb: 000000007efd8000 Win32Thread: 0000000000000000 RUNNING on processor 2
IRP List:
    Unable to read nt!_IRP @ fffffa8012358010
Not impersonating
GetUlongFromAddress: unable to read from fffff8000303eba4
Owning Process            fffffa800fb8e060       Image:         avp.exe
Attached Process          N/A            Image:         N/A
fffff78000000000: Unable to get shared data
Wait Start TickCount      127953       
Context Switch Count      25             
ReadMemory error: Cannot get nt!KeMaximumIncrement value.
UserTime                  00:00:00.000
KernelTime                00:00:00.000
Win32 Start Address 0x00000000675e4e30
Stack Init fffff880045a6c70 Current fffff8800b76d1c0
Base fffff880045a7000 Limit fffff880045a1000 Call 0
Priority 9 BasePriority 8 UnusualBoost 0 ForegroundBoost 0 IoPriority 2 PagePriority 5
Child-SP          RetAddr           : Args to Child                                                           : Call Site
fffff880`045a3328 fffff880`0120ea88 : 00000000`00000024 00000000`001904fb fffff880`045a4338 fffff880`045a3b90 : nt!KeBugCheckEx
fffff880`045a3330 fffff880`01222f3d : fffff880`01254f8c fffff880`045a4750 fffff880`045a4720 00000000`00000000 : Ntfs! ?? ::FNODOBFM::`string'+0x2b49
fffff880`045a3370 fffff800`02ef8a7c : 00000000`00000000 fffffa80`112a6900 fffff800`031c44f4 00000000`000034c0 : Ntfs! ?? ::FNODOBFM::`string'+0x12c6
fffff880`045a33b0 fffff880`012225c5 : fffff880`01254f94 fffff880`045a4720 fffff880`045a4338 fffff880`045a4720 : nt!_C_specific_handler+0x8c
fffff880`045a3420 fffff800`02ef84fd : fffff880`01254f80 00000000`00000000 fffff880`01209000 00000000`00000000 : Ntfs!_GSHandlerCheck_SEH+0x75
fffff880`045a3450 fffff800`02ef72d5 : fffff880`01254f80 fffff880`045a34c8 fffff880`045a4338 fffff880`01209000 : nt!RtlpExecuteHandlerForException+0xd
fffff880`045a3480 fffff800`02f08361 : fffff880`045a4338 fffff880`045a3b90 fffff880`00000000 fffff8a0`12fecb40 : nt!RtlDispatchException+0x415
fffff880`045a3b60 fffff800`02ecc2c2 : fffff880`045a4338 fffff8a0`12fecc70 fffff880`045a43e0 fffff8a0`0279d280 : nt!KiDispatchException+0x135
fffff880`045a4200 fffff800`02ecabca : fffffa80`0e99c0e0 fffffa80`1249cea0 00000000`00b600b6 fffff8a0`02ae5d00 : nt!KiExceptionDispatch+0xc2
fffff880`045a43e0 fffff800`02ec4b65 : fffff8a0`12fecc70 fffff880`01213a1f fffff880`045a4620 fffff880`01073aae : nt!KiGeneralProtectionFault+0x10a (TrapFrame @ fffff880`045a43e0)
fffff880`045a4570 fffff880`01213a1f : fffff880`045a4620 fffff880`01073aae fffffa80`0ea0e730 fffff880`045a46c0 : nt!ExpInterlockedPopEntrySListFault16
fffff880`045a4580 fffff880`01215a68 : fffffa80`11bda9c0 fffffa80`12358010 fffff880`045a4700 fffffa80`0ee6f001 : Ntfs!NtfsCommonRead+0x1ff
fffff880`045a4720 fffff800`03372c16 : fffffa80`12358010 fffffa80`12358010 fffffa80`0ee6f030 fffffa80`11b26b70 : Ntfs!NtfsFsdRead+0x1b8
fffff880`045a47d0 fffff880`01071bcf : fffffa80`12358368 fffff880`045a4880 fffffa80`1212c010 fffffa80`11b26b70 : nt!IovCallDriver+0x566
fffff880`045a4830 fffff880`010706df : fffffa80`0f007950 fffffa80`0f007950 fffffa80`0f007900 fffffa80`12358010 : fltmgr!FltpLegacyProcessingAfterPreCallbacksCompleted+0x24f
fffff880`045a48c0 fffff800`03372c16 : fffffa80`12358010 00000000`00000002 fffffa80`0ea0e730 fffffa80`0db35298 : fltmgr!FltpDispatch+0xcf
fffff880`045a4920 fffff800`02ef4bc5 : fffffa80`12358030 fffffa80`0f010c30 fffffa80`0f010b00 fffffa80`0ebc7d40 : nt!IovCallDriver+0x566
fffff880`045a4980 fffff800`03169417 : fffffa80`0f010b00 fffffa80`0f010b00 fffffa80`0ea0e732 fffffa80`0fc0c060 : nt!IoPageRead+0x255
fffff880`045a4a10 fffff800`03169511 : fffffa80`12267210 fffffa80`0fc0c060 fffff880`045a4b48 00000000`00000005 : nt!MiPfExecuteReadList+0xff
fffff880`045a4a70 fffff800`02ebbc8d : fffffa80`12267210 00000000`00000000 00000000`0000a000 00000000`00000000 : nt!MmPrefetchForCacheManager+0xb5
fffff880`045a4ac0 fffff800`031b6e10 : 00000000`00000000 00000000`00000000 fffffa80`0ea0e730 fffff8a0`12fce000 : nt!CcFetchDataForRead+0x17d
fffff880`045a4b20 fffff880`01213730 : fffff8a0`00000000 00000000`00000005 fffffa80`00040000 fffff880`01266001 : nt!CcCopyRead+0x180
fffff880`045a4be0 fffff880`01213da3 : 00000000`00000000 fffff8a0`12fecc70 fffff880`045a4e10 fffff8a0`12fecb40 : Ntfs!NtfsCachedRead+0x180
fffff880`045a4c40 fffff880`01215a68 : fffffa80`12127aa0 fffffa80`0ea9c010 fffff880`045a4e01 fffffa80`0ee6f000 : Ntfs!NtfsCommonRead+0x583
fffff880`045a4de0 fffff800`03372c16 : fffffa80`0ea9c010 fffffa80`0ea9c010 fffffa80`0ee6f030 fffffa80`11bc3c60 : Ntfs!NtfsFsdRead+0x1b8
fffff880`045a4e90 fffff880`01071bcf : fffffa80`0ea9c368 fffff880`045a4f40 fffffa80`12257530 fffffa80`11bc3c60 : nt!IovCallDriver+0x566
fffff880`045a4ef0 fffff880`01074aea : 00000000`00000000 00000000`00000000 00000000`00000000 fffffa80`12257530 : fltmgr!FltpLegacyProcessingAfterPreCallbacksCompleted+0x24f
fffff880`045a4f80 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : fltmgr!FltPerformSynchronousIo+0x2ca


Microsoft (R) Windows Debugger Version 6.12.0002.633 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.


Loading Dump File [C:\Users\Icarus\Downloads\Windows_NT6_BSOD_jcgriff2 - Copy\032112-28579-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available

Symbol search path is: http://msdl.microsoft.com/download/symbols
Executable search path is: 
Windows 7 Kernel Version 7601 (Service Pack 1) MP (8 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS
Built by: 7601.17640.amd64fre.win7sp1_gdr.110622-1506
Machine Name:
Kernel base = 0xfffff800`02e06000 PsLoadedModuleList = 0xfffff800`0304b670
Debug session time: Wed Mar 21 16:46:13.891 2012 (UTC - 4:00)
System Uptime: 0 days 5:01:18.561
Loading Kernel Symbols
...............................................................
................................................................
................................
Loading User Symbols
Loading unloaded module list
.....
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

Use !analyze -v to get detailed debugging information.

BugCheck 1A, {5003, fffff70001080000, 3ea30, fffff680002b4962}

Probably caused by : ntkrnlmp.exe ( nt! ?? ::FNODOBFM::`string'+2a001 )

Followup: MachineOwner
---------

3: kd> !analyze -v
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

MEMORY_MANAGEMENT (1a)
    # Any other values for parameter 1 must be individually examined.
Arguments:
Arg1: 0000000000005003, The subtype of the bugcheck.
Arg2: fffff70001080000
Arg3: 000000000003ea30
Arg4: fffff680002b4962

Debugging Details:
------------------


BUGCHECK_STR:  0x1a_5003

CUSTOMER_CRASH_COUNT:  1

DEFAULT_BUCKET_ID:  VISTA_DRIVER_FAULT

PROCESS_NAME:  TribesAscend.e

CURRENT_IRQL:  0

LAST_CONTROL_TRANSFER:  from fffff80002eed969 to fffff80002e82c40

STACK_TEXT:  
fffff880`049d1748 fffff800`02eed969 : 00000000`0000001a 00000000`00005003 fffff700`01080000 00000000`0003ea30 : nt!KeBugCheckEx
fffff880`049d1750 fffff800`02ea153f : 00000000`00000000 00000003`f514d121 00000000`00000000 fffffa80`128363f8 : nt! ?? ::FNODOBFM::`string'+0x2a001
fffff880`049d17e0 fffff800`02ea0053 : 00000000`0042203c 00000000`751b3495 fffff680`003a8d98 fffffa80`128363f8 : nt!MiResolveProtoPteFault+0x1cf
fffff880`049d1870 fffff800`02e8ff19 : 00000000`00000000 00000000`751b3495 ffffffff`ffffffff 00000000`00000000 : nt!MiDispatchFault+0x1c3
fffff880`049d1980 fffff800`02e80d6e : 00000000`00000000 00000000`751b3495 fffff880`00000001 00000000`00000000 : nt!MmAccessFault+0x359
fffff880`049d1ae0 00000000`751b3495 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiPageFault+0x16e
00000000`0b50f3e8 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x751b3495


STACK_COMMAND:  kb

FOLLOWUP_IP: 
nt! ?? ::FNODOBFM::`string'+2a001
fffff800`02eed969 cc              int     3

SYMBOL_STACK_INDEX:  1

SYMBOL_NAME:  nt! ?? ::FNODOBFM::`string'+2a001

FOLLOWUP_NAME:  MachineOwner

MODULE_NAME: nt

IMAGE_NAME:  ntkrnlmp.exe

DEBUG_FLR_IMAGE_TIMESTAMP:  4e02aaa3

FAILURE_BUCKET_ID:  X64_0x1a_5003_nt!_??_::FNODOBFM::_string_+2a001

BUCKET_ID:  X64_0x1a_5003_nt!_??_::FNODOBFM::_string_+2a001

Followup: MachineOwner
---------


Microsoft (R) Windows Debugger Version 6.12.0002.633 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.


Loading Dump File [C:\Users\Icarus\Downloads\Windows_NT6_BSOD_jcgriff2 - Copy\032112-16785-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available

Symbol search path is: http://msdl.microsoft.com/download/symbols
Executable search path is: 
Windows 7 Kernel Version 7601 (Service Pack 1) MP (8 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS
Built by: 7601.17640.amd64fre.win7sp1_gdr.110622-1506
Machine Name:
Kernel base = 0xfffff800`02e53000 PsLoadedModuleList = 0xfffff800`03098670
Debug session time: Wed Mar 21 11:44:07.660 2012 (UTC - 4:00)
System Uptime: 0 days 3:08:00.457
Loading Kernel Symbols
...............................................................
................................................................
................................
Loading User Symbols
Loading unloaded module list
.....
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

Use !analyze -v to get detailed debugging information.

BugCheck 1E, {0, 0, 0, 0}

Probably caused by : ntkrnlmp.exe ( nt!KiKernelCalloutExceptionHandler+e )

Followup: MachineOwner
---------

1: kd> !analyze -v
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

KMODE_EXCEPTION_NOT_HANDLED (1e)
This is a very common bugcheck.  Usually the exception address pinpoints
the driver/function that caused the problem.  Always note this address
as well as the link date of the driver/image that contains this address.
Arguments:
Arg1: 0000000000000000, The exception code that was not handled
Arg2: 0000000000000000, The address that the exception occurred at
Arg3: 0000000000000000, Parameter 0 of the exception
Arg4: 0000000000000000, Parameter 1 of the exception

Debugging Details:
------------------


EXCEPTION_CODE: (Win32) 0 (0) - The operation completed successfully.

FAULTING_IP: 
+3132613965316666
00000000`00000000 ??              ???

EXCEPTION_PARAMETER1:  0000000000000000

EXCEPTION_PARAMETER2:  0000000000000000

ERROR_CODE: (NTSTATUS) 0 - STATUS_WAIT_0

BUGCHECK_STR:  0x1E_0

CUSTOMER_CRASH_COUNT:  1

DEFAULT_BUCKET_ID:  VISTA_DRIVER_FAULT

PROCESS_NAME:  System

CURRENT_IRQL:  0

EXCEPTION_RECORD:  fffff8800371ba08 -- (.exr 0xfffff8800371ba08)
ExceptionAddress: fffff80002ec7942 (nt!KiIdleLoop+0x0000000000000032)
   ExceptionCode: c0000096
  ExceptionFlags: 00000000
NumberParameters: 0

TRAP_FRAME:  fffff8800371bab0 -- (.trap 0xfffff8800371bab0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000001 rbx=0000000000000000 rcx=0000000000000002
rdx=0000000000033508 rsi=0000000000000000 rdi=0000000000000000
rip=fffff80002ec7942 rsp=fffff8800371bc40 rbp=0000000000000000
 r8=0000000000016fcf  r9=0000000000000000 r10=0000000000000000
r11=0000000000000002 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0         nv up ei ng nz na po nc
nt!KiIdleLoop+0x32:
fffff800`02ec7942 440f22c1        mov     cr8,rcx
Resetting default scope

LAST_CONTROL_TRANSFER:  from fffff80002ec75fe to fffff80002ecfc10

STACK_TEXT:  
fffff880`0371aae8 fffff800`02ec75fe : fffffa80`0f230000 00000000`01840800 fffff880`0371b260 fffff800`02efb830 : nt!KeBugCheck
fffff880`0371aaf0 fffff800`02efb4fd : 00000000`0010001f fffff880`0371b260 fffff880`0371bab0 fffff880`0371ba08 : nt!KiKernelCalloutExceptionHandler+0xe
fffff880`0371ab20 fffff800`02efa2d5 : fffff800`0301a0fc fffff880`0371ab98 fffff880`0371ba08 fffff800`02e53000 : nt!RtlpExecuteHandlerForException+0xd
fffff880`0371ab50 fffff800`02f0b361 : fffff880`0371ba08 fffff880`0371b260 fffff880`00000000 fffff880`009f50c0 : nt!RtlDispatchException+0x415
fffff880`0371b230 fffff800`02ecf2c2 : fffff880`0371ba08 fffff880`009ea180 fffff880`0371bab0 00000000`00000000 : nt!KiDispatchException+0x135
fffff880`0371b8d0 fffff800`02ecdbca : fffff880`009ea180 fffff880`0371bb30 fffff880`009f50c0 000023d2`14ec1fec : nt!KiExceptionDispatch+0xc2
fffff880`0371bab0 fffff800`02ec7942 : fffff880`009ea180 fffff880`00000001 00000000`00000001 fffff880`00000000 : nt!KiGeneralProtectionFault+0x10a
fffff880`0371bc40 00000000`00000000 : fffff880`0371c000 fffff880`03716000 fffff880`0371bc00 00000000`00000000 : nt!KiIdleLoop+0x32


STACK_COMMAND:  kb

FOLLOWUP_IP: 
nt!KiKernelCalloutExceptionHandler+e
fffff800`02ec75fe 90              nop

SYMBOL_STACK_INDEX:  1

SYMBOL_NAME:  nt!KiKernelCalloutExceptionHandler+e

FOLLOWUP_NAME:  MachineOwner

MODULE_NAME: nt

IMAGE_NAME:  ntkrnlmp.exe

DEBUG_FLR_IMAGE_TIMESTAMP:  4e02aaa3

FAILURE_BUCKET_ID:  X64_0x1E_0_nt!KiKernelCalloutExceptionHandler+e

BUCKET_ID:  X64_0x1E_0_nt!KiKernelCalloutExceptionHandler+e

Followup: MachineOwner
---------
My System SpecsSystem Spec
23 Mar 2012   #3

Windows 7 Ultimate x64
 
 

Thank you for your quick reply I am gonna update and run memtest86+ again!
My System SpecsSystem Spec
.


25 Mar 2012   #4

Windows 7 Ultimate x64
 
 

Keep me updated
My System SpecsSystem Spec
01 Apr 2012   #5

Windows 7 Ultimate x64
 
 

Still testing it but it isn't showing up with anything... I have been testing it in odd bouts of time as it is the end of the year and Uni is ripping me up with work, but I got 8 passes already.
I updated and I still get these crashes though. Sometimes even the BSOD freezes which is worrying.
My System SpecsSystem Spec
01 Apr 2012   #6

Windows 7 Home Premium 64 Bit
 
 

You may not have things configured properly to run that much RAM. Do the following steps in this order:
  1. Download and install CPU-Z and Upload screenshots of the CPU, Mainboard, Memory, and SPD tabs. In the SPD tab, upload an image of each slot. Do this with all 16 GB of RAM installed.

  2. Remove two RAM modules and run with 8 GB of RAM. See if that pair is good by doing your normal routine for as long as it usually takes to get a crash. Then, swap that set of 8 GB with the other set and do the same testing by doing your normal routine for as long as it usually takes to get a crash. See if you have a bad set of RAM first. Then we can try all 16 GB and work to set up the correct settings for them. Make sure you load setup defaults in the BIOS before testing so you are running with a clean slate.
My System SpecsSystem Spec
05 Apr 2012   #7

Windows 7 Ultimate x64
 
 

Set the memory to factory specification in BIOS. Here are the images from CPUID afterwards.
Sorry for the massive delay, by the way.
My System SpecsSystem Spec
05 Apr 2012   #8

Windows 7 Home Premium 64 Bit
 
 

Are all of your modules identical? Check them very carefully. Even if bought at the same time by the same manufacturer, occasionally kits have slight variations of the RAM and those can conflict.

Are you now running with 8 GB?
My System SpecsSystem Spec
06 Apr 2012   #9

Windows 7 Ultimate x64
 
 

All of them are identical. Bought at the same place at the same time. Currently running with 16GBs.
My System SpecsSystem Spec
06 Apr 2012   #10

Windows 7 Home Premium 64 Bit
 
 

How is the system responding to the CMOS reset through loading default settings in the BIOS?
My System SpecsSystem Spec
Reply

 Random BSOD more prominent when under load with buzzing sound




Thread Tools



Similar help and support threads for2: Random BSOD more prominent when under load with buzzing sound
Thread Forum
Random BSOD, preceded by buzzing and freezing BSOD Help and Support
Random freezing with buzzing sound from speakers BSOD Help and Support
Random freezing with buzzing sound from speakers BSOD Help and Support
Buzzing Sound When I Play any Media Music, Pictures & Video
Sound is buzzing? Sound & Audio

Our Sites

Site Links

About Us

Find Us

Windows 7 Forums is an independent web site and has not been authorized, sponsored, or otherwise approved by Microsoft Corporation. "Windows 7" and related materials are trademarks of Microsoft Corp.

Designer Media Ltd

All times are GMT -5. The time now is 10:08 PM.
Twitter Facebook Google+



Windows 7 Forums

Seven Forums Android App Seven Forums IOS App
  

1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33