Bunch of different BSOD when restarting


  1. Posts : 2
    Windows Home Premium 64bit
       #1

    Bunch of different BSOD when restarting


    Upon restarting my computer i get a bunch of different BSODs. Once the computer loads the OS, which can take 20 mins to 3 hours, it wont bsod at all.

    OS Windows 7 Home Premium 64bit

    Home built 6 months ago.
      My Computer


  2. Posts : 507
    Windows 7 Ultimate x64 SP1
       #2

    Hello chrua,

    I suggest you to uninstall all Gigabyte softwares for troubleshooting problem.

    Also update these drivers:
    Code:
    Rt64win7.sys Mon Mar 22 01:57:14 2010 → Realtek LAN Driver
    RTKVHD64.sys Wed Jul 28 02:01:36 2010 →  Realtek High Definition Audio
    RTL8192su.sys Wed Nov 11 00:54:46 2009 → Belkin Wireless USB Adapter
    Then we'll see how it goes.

    Log
    Code:
    Windows 7 Kernel Version 7600 MP (4 procs) Free x64
    Product: WinNt, suite: TerminalServer SingleUserTS Personal
    Built by: 7600.16841.amd64fre.win7_gdr.110622-1503
    Machine Name:
    Kernel base = 0xfffff800`03400000 PsLoadedModuleList = 0xfffff800`0363de70
    Debug session time: Sun Sep 18 02:25:14.902 2011 (GMT-8)
    System Uptime: 0 days 0:00:14.213
    Loading Kernel Symbols
    ...............................................................
    ................................................................
    ............
    Loading User Symbols
    Loading unloaded module list
    ....
    *******************************************************************************
    *                                                                             *
    *                        Bugcheck Analysis                                    *
    *                                                                             *
    *******************************************************************************
    
    Use !analyze -v to get detailed debugging information.
    
    BugCheck 1E, {ffffffffc0000005, fffff8000374ba39, 0, ffffffffffffffff}
    
    Probably caused by : ntkrnlmp.exe ( nt!CmpGetNameControlBlock+12e )
    
    Followup: MachineOwner
    ---------
    
    0: kd> !analyze -v
    *******************************************************************************
    *                                                                             *
    *                        Bugcheck Analysis                                    *
    *                                                                             *
    *******************************************************************************
    
    KMODE_EXCEPTION_NOT_HANDLED (1e)
    This is a very common bugcheck.  Usually the exception address pinpoints
    the driver/function that caused the problem.  Always note this address
    as well as the link date of the driver/image that contains this address.
    Arguments:
    Arg1: ffffffffc0000005, The exception code that was not handled
    Arg2: fffff8000374ba39, The address that the exception occurred at
    Arg3: 0000000000000000, Parameter 0 of the exception
    Arg4: ffffffffffffffff, Parameter 1 of the exception
    
    Debugging Details:
    ------------------
    
    
    EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - The instruction at 0x%08lx referenced memory at 0x%08lx. The memory could not be %s.
    
    FAULTING_IP: 
    nt!CmpGetNameControlBlock+12e
    fffff800`0374ba39 3b3e            cmp     edi,dword ptr [rsi]
    
    EXCEPTION_PARAMETER1:  0000000000000000
    
    EXCEPTION_PARAMETER2:  ffffffffffffffff
    
    READ_ADDRESS: GetPointerFromAddress: unable to read from fffff800036a80e0
     ffffffffffffffff 
    
    CUSTOMER_CRASH_COUNT:  1
    
    DEFAULT_BUCKET_ID:  VISTA_DRIVER_FAULT
    
    BUGCHECK_STR:  0x1E
    
    PROCESS_NAME:  svchost.exe
    
    CURRENT_IRQL:  0
    
    EXCEPTION_RECORD:  fffff8800298ad78 -- (.exr 0xfffff8800298ad78)
    ExceptionAddress: fffff8000374ba39 (nt!CmpGetNameControlBlock+0x000000000000012e)
       ExceptionCode: c0000005 (Access violation)
      ExceptionFlags: 00000000
    NumberParameters: 2
       Parameter[0]: 0000000000000000
       Parameter[1]: ffffffffffffffff
    Attempt to read from address ffffffffffffffff
    
    TRAP_FRAME:  fffff8800298ae20 -- (.trap 0xfffff8800298ae20)
    NOTE: The trap frame does not contain all registers.
    Some register values may be zeroed or incorrect.
    rax=fffff8a000011000 rbx=0000000000000000 rcx=fffff8a000016f20
    rdx=000000001082fe21 rsi=0000000000000000 rdi=0000000000000000
    rip=fffff8000374ba39 rsp=fffff8800298afb0 rbp=fffff8800298b048
     r8=000000000000000f  r9=00000000000000ff r10=0000000000000065
    r11=fffff8a002716a4e r12=0000000000000000 r13=0000000000000000
    r14=0000000000000000 r15=0000000000000000
    iopl=0         nv up ei ng nz na po nc
    nt!CmpGetNameControlBlock+0x12e:
    fffff800`0374ba39 3b3e            cmp     edi,dword ptr [rsi] ds:b2ac:00000000`00000000=????????
    Resetting default scope
    
    LAST_CONTROL_TRANSFER:  from fffff800034aa919 to fffff800034705c0
    
    STACK_TEXT:  
    fffff880`0298a5a8 fffff800`034aa919 : 00000000`0000001e ffffffff`c0000005 fffff800`0374ba39 00000000`00000000 : nt!KeBugCheckEx
    fffff880`0298a5b0 fffff800`0346fc02 : fffff880`0298ad78 00000000`00000000 fffff880`0298ae20 fff7f8a0`02c7b4b8 : nt!KiDispatchException+0x1b9
    fffff880`0298ac40 fffff800`0346e50a : ffffffff`f7675381 00000000`0000001e fffff8a0`02716a30 fffff8a0`00023380 : nt!KiExceptionDispatch+0xc2
    fffff880`0298ae20 fffff800`0374ba39 : fffff8a0`076a0628 fffffa80`03a0b900 fffffa80`07437d40 00000000`00000000 : nt!KiGeneralProtectionFault+0x10a
    fffff880`0298afb0 fffff800`0374c38d : 00000000`0000000f 00000000`00005f20 00000000`00005f20 00000000`00134610 : nt!CmpGetNameControlBlock+0x12e
    fffff880`0298b010 fffff800`0374ae57 : fffff8a0`00023380 00000000`00c753c8 fffff8a0`06b5f3cc fffff8a0`02d46008 : nt!CmpCreateKeyControlBlock+0x35e
    fffff880`0298b0b0 fffff800`03746e35 : fffff8a0`00000000 fffff8a0`00c753c8 fffff8a0`00023380 fffffa80`05ea3b10 : nt!CmpDoOpen+0x387
    fffff880`0298b170 fffff800`03766ba4 : fffff800`03746960 00000000`00000001 fffffa80`05ea3b10 00000000`00000000 : nt!CmpParseKey+0x4d5
    fffff880`0298b440 fffff800`0376bb7d : fffffa80`05ea3b10 fffff880`0298b5a0 00000000`00000240 fffffa80`03a0b900 : nt!ObpLookupObjectName+0x585
    fffff880`0298b540 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!ObOpenObjectByName+0x1cd
    
    
    STACK_COMMAND:  kb
    
    FOLLOWUP_IP: 
    nt!CmpGetNameControlBlock+12e
    fffff800`0374ba39 3b3e            cmp     edi,dword ptr [rsi]
    
    SYMBOL_STACK_INDEX:  4
    
    SYMBOL_NAME:  nt!CmpGetNameControlBlock+12e
    
    FOLLOWUP_NAME:  MachineOwner
    
    MODULE_NAME: nt
    
    IMAGE_NAME:  ntkrnlmp.exe
    
    DEBUG_FLR_IMAGE_TIMESTAMP:  4e02aa44
    
    FAILURE_BUCKET_ID:  X64_0x1E_nt!CmpGetNameControlBlock+12e
    
    BUCKET_ID:  X64_0x1E_nt!CmpGetNameControlBlock+12e
    
    Followup: MachineOwner
    ---------
      My Computer


  3. Posts : 2
    Windows Home Premium 64bit
    Thread Starter
       #3

    Okay Thank You!
      My Computer


 

  Related Discussions
Our Sites
Site Links
About Us
Windows 7 Forums is an independent web site and has not been authorized, sponsored, or otherwise approved by Microsoft Corporation. "Windows 7" and related materials are trademarks of Microsoft Corp.

© Designer Media Ltd
All times are GMT -5. The time now is 17:43.
Find Us