New
#1
Random BSOD Page_Fault_In_Nonpaged_Area BugCheck 50
This has become really annoying. It was very infrequent at first, but I had to reinstall Windows 7 (64-bit) when BSOD with this error started appearing right after the system had booted. For about a day or a two there were no BSODs, but it has started happening again.
Please help.
Here's the analysis of the dump file on WinDbg:
Code:******************************************************************************* * * * Bugcheck Analysis * * * ******************************************************************************* PAGE_FAULT_IN_NONPAGED_AREA (50) Invalid system memory was referenced. This cannot be protected by try-except, it must be protected by a Probe. Typically the address is just plain bad or it is pointing at freed memory. Arguments: Arg1: fffff8a00a766000, memory referenced. Arg2: 0000000000000000, value 0 = read operation, 1 = write operation. Arg3: fffff80002f98079, If non-zero, the instruction address which referenced the bad memory address. Arg4: 0000000000000000, (reserved) Debugging Details: ------------------ Could not read faulting driver name READ_ADDRESS: GetPointerFromAddress: unable to read from fffff80002f0a0e0 GetUlongFromAddress: unable to read from fffff80002f0a198 fffff8a00a766000 Paged pool FAULTING_IP: nt!MiCompressRelocations+70 fffff800`02f98079 410fb701 movzx eax,word ptr [r9] MM_INTERNAL_CODE: 0 CUSTOMER_CRASH_COUNT: 1 DEFAULT_BUCKET_ID: WIN7_DRIVER_FAULT BUGCHECK_STR: 0x50 PROCESS_NAME: svchost.exe CURRENT_IRQL: 0 ANALYSIS_VERSION: 6.3.9600.17298 (debuggers(dbg).141024-1500) amd64fre TRAP_FRAME: fffff880085fa000 -- (.trap 0xfffff880085fa000) NOTE: The trap frame does not contain all registers. Some register values may be zeroed or incorrect. rax=0000000000000000 rbx=0000000000000000 rcx=0000000000000000 rdx=0000000000000000 rsi=0000000000000000 rdi=0000000000000000 rip=fffff80002f98079 rsp=fffff880085fa190 rbp=000000000008fc28 r8=000000007ffff960 r9=fffff8a00a766000 r10=000000000006ed2c r11=0000000000000008 r12=0000000000000000 r13=0000000000000000 r14=0000000000000000 r15=0000000000000000 iopl=0 nv up ei pl nz na po nc nt!MiCompressRelocations+0x70: fffff800`02f98079 410fb701 movzx eax,word ptr [r9] ds:fffff8a0`0a766000=???? Resetting default scope LAST_CONTROL_TRANSFER: from fffff80002d531e4 to fffff80002cd3f00 STACK_TEXT: fffff880`085f9e98 fffff800`02d531e4 : 00000000`00000050 fffff8a0`0a766000 00000000`00000000 fffff880`085fa000 : nt!KeBugCheckEx fffff880`085f9ea0 fffff800`02cd1fee : 00000000`00000000 00000000`00000003 fffff800`02e89a00 fffff800`02cfae00 : nt! ?? ::FNODOBFM::`string'+0x42907 fffff880`085fa000 fffff800`02f98079 : 00000000`01000000 fffff800`02f98461 fffffa80`04a00930 fffff800`02f985a4 : nt!KiPageFault+0x16e fffff880`085fa190 fffff800`02f96932 : 00000000`000d56a0 00000000`01000000 00000000`00000001 00000000`00000004 : nt!MiCompressRelocations+0x70 fffff880`085fa1e0 fffff800`02fcc5d1 : fffff8a0`0a4dd000 fffff880`085fa3f0 00000000`00000095 00000000`00000000 : nt!MiRelocateImage+0x4a2 fffff880`085fa350 fffff800`02fc1893 : fffff880`085fa5b0 00000000`00000000 fffff880`085fa658 00000000`00000001 : nt!MmCreateSection+0x825 fffff880`085fa560 fffff800`03130573 : 00000000`00000000 fffff8a0`0a4035b0 00000000`00000000 00000000`00000001 : nt!NtCreateSection+0x162 fffff880`085fa5e0 fffff800`03130b01 : 00000000`00000000 fffff8a0`0a4035b0 fffffa80`085662f0 fffff880`00000060 : nt!PfpFileBuildReadSupport+0x163 fffff880`085fa6d0 fffff800`03138c1e : fffff8a0`00000000 fffff8a0`00000006 fffff8a0`00000008 00000000`00000001 : nt!PfpPrefetchFilesTrickle+0x121 fffff880`085fa7d0 fffff800`031397b7 : 00000000`00000000 fffff880`085fac60 fffff880`085fa9c8 fffff8a0`026e2060 : nt!PfpPrefetchRequestPerform+0x30e fffff880`085fa920 fffff800`03145d8e : fffff880`085fa9c8 00000000`00000001 fffffa80`092f68c0 00000000`00000000 : nt!PfpPrefetchRequest+0x176 fffff880`085fa990 fffff800`0314a4be : 00000000`00000000 00000000`01ecf7d0 00000000`0000004f fffffa80`084cab01 : nt!PfSetSuperfetchInformation+0x1ad fffff880`085faa70 fffff800`02cd3153 : fffffa80`093158b0 00000000`0000004f 00000000`00000001 00000000`00000001 : nt!NtSetSystemInformation+0xb91 fffff880`085fabe0 00000000`773515aa : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x13 00000000`01ecf738 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x773515aa STACK_COMMAND: kb FOLLOWUP_IP: nt!MiCompressRelocations+70 fffff800`02f98079 410fb701 movzx eax,word ptr [r9] SYMBOL_STACK_INDEX: 3 SYMBOL_NAME: nt!MiCompressRelocations+70 FOLLOWUP_NAME: MachineOwner MODULE_NAME: nt DEBUG_FLR_IMAGE_TIMESTAMP: 4a5bc600 IMAGE_VERSION: 6.1.7600.16385 IMAGE_NAME: memory_corruption FAILURE_BUCKET_ID: X64_0x50_nt!MiCompressRelocations+70 BUCKET_ID: X64_0x50_nt!MiCompressRelocations+70 ANALYSIS_SOURCE: KM FAILURE_ID_HASH_STRING: km:x64_0x50_nt!micompressrelocations+70 FAILURE_ID_HASH: {90c79c81-a817-2366-53af-400839fd88f1} Followup: MachineOwner ---------