New
#1
BSOD at semi-frequent rate, sometimes when computer boots from sleep
Hi guys, I made a custom built computer about half a year ago, and since that time, I've been having pretty regular BSODs and other problems. I have 8 GB (2x4 GB) of RAM, and on my own, I've ran memtest86+ for 12 hours without problem, with both in and one stick at a time. I also have a R9 270x and a 450 W good PSU, so maybe power is a problem, but I don't have a way to test that. Anyway, I've tried following the instructions for posting here, but whenever run the dm log collector, the application collects logs and everything automatically without asking me where to save, so I have no idea where to find the file I need. Here's a copy and paste of my latest minidump file though, if it's of any use.
Code:******************************************************************************* * * * Bugcheck Analysis * * * ******************************************************************************* DRIVER_IRQL_NOT_LESS_OR_EQUAL (d1) An attempt was made to access a pageable (or completely invalid) address at an interrupt request level (IRQL) that is too high. This is usually caused by drivers using improper addresses. If kernel debugger is available get stack backtrace. Arguments: Arg1: fffff28006bfa738, memory referenced Arg2: 0000000000000002, IRQL Arg3: 0000000000000001, value 0 = read operation, 1 = write operation Arg4: fffff88001a50e8f, address which referenced memory Debugging Details: ------------------ WRITE_ADDRESS: GetPointerFromAddress: unable to read from fffff80003303100 fffff28006bfa738 CURRENT_IRQL: 2 FAULTING_IP: tcpip!TtStopTimer+f fffff880`01a50e8f 49894008 mov qword ptr [r8+8],rax CUSTOMER_CRASH_COUNT: 1 DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT BUGCHECK_STR: 0xD1 PROCESS_NAME: System TRAP_FRAME: fffff80000b99a40 -- (.trap 0xfffff80000b99a40) NOTE: The trap frame does not contain all registers. Some register values may be zeroed or incorrect. rax=fffffa8006bfa730 rbx=0000000000000000 rcx=fffffa800afa10e0 rdx=fffffa8006bfa728 rsi=0000000000000000 rdi=0000000000000000 rip=fffff88001a50e8f rsp=fffff80000b99bd8 rbp=0000000000000000 r8=fffff28006bfa730 r9=fffffa8006bfa730 r10=fffff88001b898e0 r11=000000000000000f r12=0000000000000000 r13=0000000000000000 r14=0000000000000000 r15=0000000000000000 iopl=0 nv up ei pl nz na pe nc tcpip!TtStopTimer+0xf: fffff880`01a50e8f 49894008 mov qword ptr [r8+8],rax ds:0001:fffff280`06bfa738=???????????????? Resetting default scope LAST_CONTROL_TRANSFER: from fffff800030c5e69 to fffff800030c68c0 STACK_TEXT: fffff800`00b998f8 fffff800`030c5e69 : 00000000`0000000a fffff280`06bfa738 00000000`00000002 00000000`00000001 : nt!KeBugCheckEx fffff800`00b99900 fffff800`030c4ae0 : fffff800`03253cc0 fffff800`030d31f8 fffff880`01b6d9a0 fffffa80`06bfa6e0 : nt!KiBugCheckDispatch+0x69 fffff800`00b99a40 fffff880`01a50e8f : fffff880`01a329fa fffffa80`0b942080 fffff880`01a2dfe6 fffff800`00b99c78 : nt!KiPageFault+0x260 fffff800`00b99bd8 fffff880`01a329fa : fffffa80`0b942080 fffff880`01a2dfe6 fffff800`00b99c78 00000000`00000000 : tcpip!TtStopTimer+0xf fffff800`00b99be0 fffff880`01a32e2e : 00000000`00000000 00000000`00000001 00000000`00000000 00000000`00000000 : tcpip!IppUninitializeNeighbor+0x5a fffff800`00b99c10 fffff880`01a1626d : fffffa80`0b00e4d0 00000000`00000001 fffffa80`0b06e0e0 00000000`00000007 : tcpip!IppResetNeighborUnderLock+0x1e fffff800`00b99c40 fffff880`01a162cc : fffffa80`0b00e4d0 00000000`00000001 00000000`00000001 fffffa80`07b70b70 : tcpip!IppResetNeighborsUnderNSLock+0xde fffff800`00b99cb0 fffff880`01a13d9f : fffffa80`0b06e0e0 00000000`00000001 fffff800`00b99e38 fffffa80`0b06e0e0 : tcpip!IppReconnectSubInterface+0x4c fffff800`00b99d10 fffff880`01a25c14 : fffff800`00b99e38 fffff800`00b99f80 fffffa80`0b06e0e0 fffffa80`0b00e4d0 : tcpip!IppSetSubInterfaceLinkStatusUnderLock+0x6f fffff800`00b99d50 fffff880`01a13cf2 : fffffa80`0b06ea50 00000000`40010001 00000000`0000002f fffff800`03278ba0 : tcpip!IpFlcUpdateSubInterface+0x94 fffff800`00b99de0 fffff880`019235bc : fffffa80`00000001 00000000`00000000 fffffa80`0b070010 00000000`00000000 : tcpip!FlStatus+0x222 fffff800`00b99e90 fffff880`018a630c : fffffa80`0b010c80 fffffa80`0a8c11a0 fffffa80`0a8c11a0 fffffa80`0b010c80 : ndis!ndisIndicateStatusInternal+0x8ec fffff800`00b9a0b0 fffff880`018a6400 : fffffa80`0b010702 00000003`00000028 00000000`40010017 fffff800`00b9a330 : ndis!NdisFIndicateStatus+0x16c fffff800`00b9a150 fffff880`0439e5b1 : 00000000`00000002 fffff800`00000028 fffffa80`0b007730 fffff800`00b9a330 : ndis!NdisFIndicateStatus+0x260 fffff800`00b9a1f0 fffff880`019239cf : 00000000`950e3a00 fffff800`030192ec fffffa80`0a8c11a0 00000000`40010017 : pacer!PcFilterStatus+0x91 fffff800`00b9a260 fffff880`1053dfd5 : 00000000`00000001 00000000`03000702 ffff0007`950e3a00 fffff800`030192ec : ndis!NdisMIndicateStatusEx+0x28f fffff800`00b9a310 00000000`00000001 : 00000000`03000702 ffff0007`950e3a00 fffff800`030192ec 00000001`00280180 : Rt64win7+0x20fd5 fffff800`00b9a318 00000000`03000702 : ffff0007`950e3a00 fffff800`030192ec 00000001`00280180 00000000`00000002 : 0x1 fffff800`00b9a320 ffff0007`950e3a00 : fffff800`030192ec 00000001`00280180 00000000`00000002 00000000`3b9aca00 : 0x3000702 fffff800`00b9a328 fffff800`030192ec : 00000001`00280180 00000000`00000002 00000000`3b9aca00 00000000`3b9aca00 : 0xffff0007`950e3a00 fffff800`00b9a330 00000000`00000000 : fffff800`00b9a330 00000000`00000028 00000000`00000000 00000000`00000000 : hal!HalpTscStallExecutionProcessor+0xe8 STACK_COMMAND: kb FOLLOWUP_IP: pacer!PcFilterStatus+91 fffff880`0439e5b1 eb12 jmp pacer!PcFilterStatus+0xa5 (fffff880`0439e5c5) SYMBOL_STACK_INDEX: e SYMBOL_NAME: pacer!PcFilterStatus+91 FOLLOWUP_NAME: MachineOwner MODULE_NAME: pacer IMAGE_NAME: pacer.sys DEBUG_FLR_IMAGE_TIMESTAMP: 4ce7a862 FAILURE_BUCKET_ID: X64_0xD1_pacer!PcFilterStatus+91 BUCKET_ID: X64_0xD1_pacer!PcFilterStatus+91 Followup: MachineOwner
Last edited by Brink; 16 May 2015 at 10:43. Reason: code box