Blue Screen Reoccurring x64 Win 7 Pro


  1. Posts : 51
    MS Windows 7 64-bit SP1
       #1

    Blue Screen Reoccurring x64 Win 7 Pro


    sick of these at random times doing random things
      My Computer


  2. Posts : 28,845
    Win 8 Release candidate 8400
       #2

    PocketAcesDMB said:
    sick of these at random times doing random things

    Memory corruption caused by unknown driver... please run memtest and driver verifier


    Download a copy of Memtest86 and burn the ISO to a CD using Iso Recorder or another ISO burning program.

    Boot from the CD, and leave it running for at least 5 or 6 passes.

    Just remember, any time Memtest reports errors, it can be either bad RAM or a bad motherboard slot.

    Test the sticks individually, and if you find a good one, test it in all slots.



    Driver verifier

    I'd suggest that you first backup your stuff and then make sure you've got access to another computer so you can contact us if problems arise. Then make a System Restore point (so you can restore the system using the Vista/Win7 Startup Repair feature).

    In Windows 7 you can make a Startup Repair disk by going to Start....All Programs...Maintenance...Create a System Repair Disc - with Windows Vista you'll have to use your installation disk or the "Repair your computer" option at the top of the Safe Mode menu .

    Then, here's the procedure:
    - Go to Start and type in "verifier" (without the quotes) and press Enter
    - Select "Create custom settings (for code developers)" and click "Next"
    - Select "Select individual settings from a full list" and click "Next"
    - Select everything EXCEPT FOR "Low Resource Simulation" and click "Next"
    - Select "Select driver names from a list" and click "Next"
    Then select all drivers NOT provided by Microsoft and click "Next"
    - Select "Finish" on the next page.

    Reboot the system and wait for it to crash to the Blue Screen. Continue to use your system normally, and if you know what causes the crash, do that repeatedly. The objective here is to get the system to crash because Driver Verifier is stressing the drivers out. If it doesn't crash for you, then let it run for at least 36 hours of continuous operation (an estimate on my part).

    If you can't get into Windows because it crashes too soon, try it in Safe Mode.
    If you can't get into Safe Mode, try using System Restore from your installation DVD to set the system back to the previous restore point that you created.
    Code:
    Microsoft (R) Windows Debugger Version 6.11.0001.404 X86
    Copyright (c) Microsoft Corporation. All rights reserved.
    
    
    Loading Dump File [C:\Users\K\Desktop\Windows_NT6_BSOD_jcgriff2\060611-29265-01.dmp]
    Mini Kernel Dump File: Only registers and stack trace are available
    
    Symbol search path is: SRV*C:\Symbols*http://msdl.microsoft.com/download/symbols;srv*e:\symbols
    *http://msdl.microsoft.com/download/symbols
    Executable search path is: 
    Windows 7 Kernel Version 7601 (Service Pack 1) MP (4 procs) Free x64
    Product: WinNt, suite: TerminalServer SingleUserTS
    Built by: 7601.17592.amd64fre.win7sp1_gdr.110408-1631
    Machine Name:
    Kernel base = 0xfffff800`02c17000 PsLoadedModuleList = 0xfffff800`02e5c650
    Debug session time: Mon Jun  6 15:48:42.531 2011 (GMT-4)
    System Uptime: 1 days 1:25:00.173
    Loading Kernel Symbols
    ...............................................................
    ................................................................
    .............................................
    Loading User Symbols
    Loading unloaded module list
    .........
    *******************************************************************************
    *                                                                             *
    *                        Bugcheck Analysis                                    *
    *                                                                             *
    *******************************************************************************
    
    Use !analyze -v to get detailed debugging information.
    
    BugCheck A, {fffffa80260180a8, 2, 1, fffff80002d4b036}
    
    Probably caused by : memory_corruption ( nt!MiReleaseConfirmedPageFileSpace+86 )
    
    Followup: MachineOwner
    ---------
    
    3: kd> !analyze -v
    *******************************************************************************
    *                                                                             *
    *                        Bugcheck Analysis                                    *
    *                                                                             *
    *******************************************************************************
    
    IRQL_NOT_LESS_OR_EQUAL (a)
    An attempt was made to access a pageable (or completely invalid) address at an
    interrupt request level (IRQL) that is too high.  This is usually
    caused by drivers using improper addresses.
    If a kernel debugger is available get the stack backtrace.
    Arguments:
    Arg1: fffffa80260180a8, memory referenced
    Arg2: 0000000000000002, IRQL
    Arg3: 0000000000000001, bitfield :
        bit 0 : value 0 = read operation, 1 = write operation
        bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
    Arg4: fffff80002d4b036, address which referenced memory
    
    Debugging Details:
    ------------------
    
    
    WRITE_ADDRESS: GetPointerFromAddress: unable to read from fffff80002ec6100
     fffffa80260180a8 
    
    CURRENT_IRQL:  2
    
    FAULTING_IP: 
    nt!MiReleaseConfirmedPageFileSpace+86
    fffff800`02d4b036 480fb328        btr     qword ptr [rax],rbp
    
    CUSTOMER_CRASH_COUNT:  1
    
    DEFAULT_BUCKET_ID:  VISTA_DRIVER_FAULT
    
    BUGCHECK_STR:  0xA
    
    PROCESS_NAME:  System
    
    TRAP_FRAME:  fffff880033fc8e0 -- (.trap 0xfffff880033fc8e0)
    NOTE: The trap frame does not contain all registers.
    Some register values may be zeroed or incorrect.
    rax=fffffa8006b18010 rbx=0000000000000000 rcx=0000000000000000
    rdx=0000000000000000 rsi=0000000000000000 rdi=0000000000000000
    rip=fffff80002d4b036 rsp=fffff880033fca70 rbp=00000000fa8004cf
     r8=fffff880033fcaa0  r9=0000000000000002 r10=0000000000000000
    r11=0000058000000000 r12=0000000000000000 r13=0000000000000000
    r14=0000000000000000 r15=0000000000000000
    iopl=0         nv up ei pl zr na po nc
    nt!MiReleaseConfirmedPageFileSpace+0x86:
    fffff800`02d4b036 480fb328        btr     qword ptr [rax],rbp ds:fffffa80`06b18010=70fffe67b3cc5fff
    Resetting default scope
    
    LAST_CONTROL_TRANSFER:  from fffff80002c962a9 to fffff80002c96d00
    
    STACK_TEXT:  
    fffff880`033fc798 fffff800`02c962a9 : 00000000`0000000a fffffa80`260180a8 00000000`00000002 00000000`00000001 : nt!KeBugCheckEx
    fffff880`033fc7a0 fffff800`02c94f20 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiBugCheckDispatch+0x69
    fffff880`033fc8e0 fffff800`02d4b036 : fffffa80`048ddde0 00000000`00000000 fffffa80`05f389f0 fffff800`02ca88ec : nt!KiPageFault+0x260
    fffff880`033fca70 fffff800`02d02161 : fa8004cf`568000c0 00000000`00000000 fa8004cf`568000c0 00000000`00000000 : nt!MiReleaseConfirmedPageFileSpace+0x86
    fffff880`033fcaf0 fffff800`02f375fb : fffffa80`04cf5600 00000000`00000000 00000000`0008c081 fffffa80`0425c450 : nt! ?? ::FNODOBFM::`string'+0x2bd1d
    fffff880`033fcbc0 fffff800`02ce40a1 : fffffa80`04cf5608 00000000`00000001 00000000`00000000 00000000`00000631 : nt!MiSegmentDelete+0x7b
    fffff880`033fcc00 fffff800`02ce3f65 : 00000000`00000000 00000000`00000080 fffffa80`039cd840 fffffa80`00000012 : nt!MiProcessDereferenceList+0x131
    fffff880`033fccc0 fffff800`02f3332e : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!MiDereferenceSegmentThread+0x10d
    fffff880`033fcd40 fffff800`02c88666 : fffff880`03163180 fffffa80`039f0b60 fffff880`0316dfc0 00000000`00000000 : nt!PspSystemThreadStartup+0x5a
    fffff880`033fcd80 00000000`00000000 : fffff880`033fd000 fffff880`033f7000 fffff880`033fc7f0 00000000`00000000 : nt!KiStartSystemThread+0x16
    
    
    STACK_COMMAND:  kb
    
    FOLLOWUP_IP: 
    nt!MiReleaseConfirmedPageFileSpace+86
    fffff800`02d4b036 480fb328        btr     qword ptr [rax],rbp
    
    SYMBOL_STACK_INDEX:  3
    
    SYMBOL_NAME:  nt!MiReleaseConfirmedPageFileSpace+86
    
    FOLLOWUP_NAME:  MachineOwner
    
    MODULE_NAME: nt
    
    DEBUG_FLR_IMAGE_TIMESTAMP:  4d9fdd5b
    
    IMAGE_NAME:  memory_corruption
    
    FAILURE_BUCKET_ID:  X64_0xA_nt!MiReleaseConfirmedPageFileSpace+86
    
    BUCKET_ID:  X64_0xA_nt!MiReleaseConfirmedPageFileSpace+86
    
    Followup: MachineOwner
    ---------
      My Computer


  3. Posts : 51
    MS Windows 7 64-bit SP1
    Thread Starter
       #3

    update 1

    upon running driver verifier at reboot i get the blue screen of SmartDefragDriver.sys...i have run memtest with no errors reported as well previousley
      My Computer


  4. Posts : 28,845
    Win 8 Release candidate 8400
       #4

    PocketAcesDMB said:
    update 1

    upon running driver verifier at reboot i get the blue screen of SmartDefragDriver.sys...i have run memtest with no errors reported as well previousley
    So remove Iobits smart defragger. Smart Defrag | Best Disk Defrag Freeware | Free Defragmenter

    And turn driver verifier off
      My Computer


 

  Related Discussions
Our Sites
Site Links
About Us
Windows 7 Forums is an independent web site and has not been authorized, sponsored, or otherwise approved by Microsoft Corporation. "Windows 7" and related materials are trademarks of Microsoft Corp.

© Designer Media Ltd
All times are GMT -5. The time now is 01:14.
Find Us