Random BSOD after system maintenance

Page 1 of 9 123 ... LastLast

  1. Posts : 272
    Windows 7 Ultimate x64 Full Retail SP1
       #1

    Random BSOD after system maintenance


    Hello all,
    I had installed a Samsung 830 128 GB SSD about 3 weeks ago. I cloned my then C: drive as opposed to a clean install. Things were OK for a while, then I had graphic and sound issues with games that I had installed long ago (Steam COD games specifically). I tried a number of solutions to no avail (most other programs worked correctly). I gave up and did a clean install of windows to the SSD and reinstalled some other programs (Steam and games, already on a different drive). Graphics problem persisted so I tore the machine apart, cleaned up the cable layout, re-seated everything and yesterday all performed correctly. This AM, I got 2 BSODs very soon after booting up. Knowing that I'd be posting here now, I ran MEMTEST all day while I was at work, 5 passes no errors. Dump etc attached as per the new instructions (not JGriff anymore). Help...

    Thanks in advance,
    Alex

    Edit: By posting this, I realize that my computer will 'behave' for at least 2 days or until I repost saying 'all is well'. It's like going to a repair shop and trying to reproduce a symptom in an ailing car...
    Last edited by badkarma11; 10 Sep 2012 at 19:45. Reason: extra comment
      My Computer


  2. Arc
    Posts : 35,373
    Microsoft Windows 10 Pro Insider Preview 64-bit
       #2

    Hello badkarma11, both of your dumps indicate to BugCheck 1A, Probably caused by : ntkrnlmp.exe.

    ► A bugcheck 1A may occur duet to memory failure. So it is suggested to run memtest.
    RAM - Test with Memtest86+

    ► It occurs also due to device drivers. But no driver is found in the stacks. So, it is suggested that you enable driver verifier.
    Driver Verifier - Enable and Disable

    ► At the same time, a couple of your drivers are a bit old.


    ► Install Microsoft Security Essentials - Free Antivirus for Windows.



    Let us know what happened after those.
      My Computer


  3. Posts : 272
    Windows 7 Ultimate x64 Full Retail SP1
    Thread Starter
       #3

    Arc said:
    Hello badkarma11, both of your dumps indicate to BugCheck 1A, Probably caused by : ntkrnlmp.exe.

    ► A bugcheck 1A may occur duet to memory failure. So it is suggested to run memtest.
    RAM - Test with Memtest86+

    ► It occurs also due to device drivers. But no driver is found in the stacks. So, it is suggested that you enable driver verifier.
    Driver Verifier - Enable and Disable

    ► At the same time, a couple of your drivers are a bit old.

    ► Install Microsoft Security Essentials - Free Antivirus for Windows.



    Let us know what happened after those.
    Hi Arc, thanks for the reply:
    1. as said in the original post, I did memtest before posting this. All was well
    2. OK, I'll try driver verifier
    3. Realtek driver is for the onboard sound device. I'm pretty sure it's disabled in the BIOS, but windows might have picked it up. I have the most up to date creative drivers for my product that I can find.
    4. I have already installed MSE, have used it since I installed Win7

    Thanks again. The machine ran fine all last night and this morning but I'll do the above and report back.
      My Computer


  4. Posts : 272
    Windows 7 Ultimate x64 Full Retail SP1
    Thread Starter
       #4

    OK, enabled Verifier and it BSOD'd until I booted in Safe Mode and turned it off. Dump(s) attached. I disabled the Realtek critter, it was my wired network adapter (don't use it). Ugh. Help me Obi Wan, you're my only hope...

    got BSOD'd to death this morning. I've booted in safe mode and I'm going to scan for malware with everything I can find. Starting with MBAM and then SuperAntiSpyware, we'll see how that goes.
    Last edited by badkarma11; 12 Sep 2012 at 08:21. Reason: additional information
      My Computer


  5. Posts : 272
    Windows 7 Ultimate x64 Full Retail SP1
    Thread Starter
       #5

    Anti virus found 1 Trojan and some cookies. I rebooted in normal mode and the machine behaved all last night. This morning another BSOD.... Arc, can you look at the driver verifier dumps above please? This is driving me nuts!!
    Thanks
      My Computer


  6. Arc
    Posts : 35,373
    Microsoft Windows 10 Pro Insider Preview 64-bit
       #6

    Obviously. Let me see the crash dump you got in the morning :)

    And, your help in this section is highly appreciated
      My Computer


  7. Posts : 272
    Windows 7 Ultimate x64 Full Retail SP1
    Thread Starter
       #7

    I'll post that when I get home, I didn't have time this morning. Let me know what you find in the other dump.
    Glad to help others if I can, same as you :)
      My Computer


  8. Arc
    Posts : 35,373
    Microsoft Windows 10 Pro Insider Preview 64-bit
       #8

      My Computer


  9. Posts : 272
    Windows 7 Ultimate x64 Full Retail SP1
    Thread Starter
       #9

    Apparntly my PC is not a morning person. It ran flawlessly all last night and this morning, BOOM. dump attached. Ugh
      My Computer


  10. Arc
    Posts : 35,373
    Microsoft Windows 10 Pro Insider Preview 64-bit
       #10

    Getting nothing out of that one.
    Asking for some more help.
    Code:
    ......
    *******************************************************************************
    *                                                                             *
    *                        Bugcheck Analysis                                    *
    *                                                                             *
    *******************************************************************************
    
    Use !analyze -v to get detailed debugging information.
    
    BugCheck 4E, {99, 17085c, 2, 18021b}
    
    Probably caused by : memory_corruption ( nt!MiBadShareCount+4c )
    
    Followup: MachineOwner
    ---------
    
    1: kd> !analyze -v
    *******************************************************************************
    *                                                                             *
    *                        Bugcheck Analysis                                    *
    *                                                                             *
    *******************************************************************************
    
    PFN_LIST_CORRUPT (4e)
    Typically caused by drivers passing bad memory descriptor lists (ie: calling
    MmUnlockPages twice with the same list, etc).  If a kernel debugger is
    available get the stack trace.
    Arguments:
    Arg1: 0000000000000099, A PTE or PFN is corrupt
    Arg2: 000000000017085c, page frame number
    Arg3: 0000000000000002, current page state
    Arg4: 000000000018021b, 0
    
    Debugging Details:
    ------------------
    
    
    BUGCHECK_STR:  0x4E_99
    
    CUSTOMER_CRASH_COUNT:  1
    
    DEFAULT_BUCKET_ID:  VISTA_DRIVER_FAULT
    
    PROCESS_NAME:  bf3.exe
    
    CURRENT_IRQL:  2
    
    LAST_CONTROL_TRANSFER:  from fffff8000314e0cc to fffff800030c81c0
    
    STACK_TEXT:  
    fffff880`09db3218 fffff800`0314e0cc : 00000000`0000004e 00000000`00000099 00000000`0017085c 00000000`00000002 : nt!KeBugCheckEx
    fffff880`09db3220 fffff800`03078d98 : 00000000`0017901d fffffa80`0451cd10 00000000`00000000 fffff8a0`092fba40 : nt!MiBadShareCount+0x4c
    fffff880`09db3260 fffff800`033d48c9 : fffff980`16140000 fffff8a0`093b1750 00000000`00000000 00000000`00000000 : nt! ?? ::FNODOBFM::`string'+0x2c007
    fffff880`09db3540 fffff800`030ead5b : 00000000`2cb00000 fffffa80`069fa490 00000000`00000000 00000000`2d100000 : nt!CcUnmapVacb+0x5d
    fffff880`09db3580 fffff800`030dd5d9 : fffff980`2fabe001 00000000`2c900000 fffffa80`0b96f5a0 fffffa80`069eaa10 : nt!CcUnmapVacbArray+0x1bb
    fffff880`09db3610 fffff800`033ad9b2 : 00000000`00000000 00000000`2d1190fa fffff880`09db36e0 fffff880`09db3770 : nt!CcGetVirtualAddress+0x38a
    fffff880`09db36a0 fffff880`012c5f08 : fffff880`00000000 00000000`00000005 fffffa80`0b862e60 fffffa80`00000001 : nt!CcCopyRead+0x132
    fffff880`09db3760 fffff880`010c6098 : fffffa80`0ba26dc0 fffffa80`0b862df8 00000000`00000000 fffffa80`0ba26e01 : Ntfs!NtfsCopyReadA+0x1a8
    fffff880`09db3940 fffff880`010c98ba : fffff880`09db3a10 00000000`f0251e03 00000000`f0251e00 fffffa80`0ba26d00 : fltmgr!FltpPerformFastIoCall+0x88
    fffff880`09db39a0 fffff880`010e7630 : fffffa80`0ba26dc0 00000000`00000000 fffff880`09db3b00 00000000`000000bb : fltmgr!FltpPassThroughFastIo+0xda
    fffff880`09db39e0 fffff800`033ad539 : fffffa80`0ba26dc0 fffffa80`00000001 fffffa80`06a69260 fffffa80`0ba26dc0 : fltmgr!FltpFastIoRead+0x1d0
    fffff880`09db3a80 fffff800`030c7453 : 00000000`000002b8 00000000`00000000 00000000`00000000 00000000`00000000 : nt!NtReadFile+0x417
    fffff880`09db3b70 00000000`74682e09 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x13
    00000000`04d8f0f8 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x74682e09
    
    
    STACK_COMMAND:  kb
    
    FOLLOWUP_IP: 
    nt!MiBadShareCount+4c
    fffff800`0314e0cc cc              int     3
    
    SYMBOL_STACK_INDEX:  1
    
    SYMBOL_NAME:  nt!MiBadShareCount+4c
    
    FOLLOWUP_NAME:  MachineOwner
    
    MODULE_NAME: nt
    
    DEBUG_FLR_IMAGE_TIMESTAMP:  4fa390f3
    
    IMAGE_NAME:  memory_corruption
    
    FAILURE_BUCKET_ID:  X64_0x4E_99_nt!MiBadShareCount+4c
    
    BUCKET_ID:  X64_0x4E_99_nt!MiBadShareCount+4c
    
    Followup: MachineOwner
    ---------
    
    1: kd> kb
    RetAddr           : Args to Child                                                           : Call Site
    fffff800`0314e0cc : 00000000`0000004e 00000000`00000099 00000000`0017085c 00000000`00000002 : nt!KeBugCheckEx
    fffff800`03078d98 : 00000000`0017901d fffffa80`0451cd10 00000000`00000000 fffff8a0`092fba40 : nt!MiBadShareCount+0x4c
    fffff800`033d48c9 : fffff980`16140000 fffff8a0`093b1750 00000000`00000000 00000000`00000000 : nt! ?? ::FNODOBFM::`string'+0x2c007
    fffff800`030ead5b : 00000000`2cb00000 fffffa80`069fa490 00000000`00000000 00000000`2d100000 : nt!CcUnmapVacb+0x5d
    fffff800`030dd5d9 : fffff980`2fabe001 00000000`2c900000 fffffa80`0b96f5a0 fffffa80`069eaa10 : nt!CcUnmapVacbArray+0x1bb
    fffff800`033ad9b2 : 00000000`00000000 00000000`2d1190fa fffff880`09db36e0 fffff880`09db3770 : nt!CcGetVirtualAddress+0x38a
    fffff880`012c5f08 : fffff880`00000000 00000000`00000005 fffffa80`0b862e60 fffffa80`00000001 : nt!CcCopyRead+0x132
    fffff880`010c6098 : fffffa80`0ba26dc0 fffffa80`0b862df8 00000000`00000000 fffffa80`0ba26e01 : Ntfs!NtfsCopyReadA+0x1a8
    fffff880`010c98ba : fffff880`09db3a10 00000000`f0251e03 00000000`f0251e00 fffffa80`0ba26d00 : fltmgr!FltpPerformFastIoCall+0x88
    fffff880`010e7630 : fffffa80`0ba26dc0 00000000`00000000 fffff880`09db3b00 00000000`000000bb : fltmgr!FltpPassThroughFastIo+0xda
    fffff800`033ad539 : fffffa80`0ba26dc0 fffffa80`00000001 fffffa80`06a69260 fffffa80`0ba26dc0 : fltmgr!FltpFastIoRead+0x1d0
    fffff800`030c7453 : 00000000`000002b8 00000000`00000000 00000000`00000000 00000000`00000000 : nt!NtReadFile+0x417
    00000000`74682e09 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x13
    00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x74682e09
    1: kd> kv
    Child-SP          RetAddr           : Args to Child                                                           : Call Site
    fffff880`09db3218 fffff800`0314e0cc : 00000000`0000004e 00000000`00000099 00000000`0017085c 00000000`00000002 : nt!KeBugCheckEx
    fffff880`09db3220 fffff800`03078d98 : 00000000`0017901d fffffa80`0451cd10 00000000`00000000 fffff8a0`092fba40 : nt!MiBadShareCount+0x4c
    fffff880`09db3260 fffff800`033d48c9 : fffff980`16140000 fffff8a0`093b1750 00000000`00000000 00000000`00000000 : nt! ?? ::FNODOBFM::`string'+0x2c007
    fffff880`09db3540 fffff800`030ead5b : 00000000`2cb00000 fffffa80`069fa490 00000000`00000000 00000000`2d100000 : nt!CcUnmapVacb+0x5d
    fffff880`09db3580 fffff800`030dd5d9 : fffff980`2fabe001 00000000`2c900000 fffffa80`0b96f5a0 fffffa80`069eaa10 : nt!CcUnmapVacbArray+0x1bb
    fffff880`09db3610 fffff800`033ad9b2 : 00000000`00000000 00000000`2d1190fa fffff880`09db36e0 fffff880`09db3770 : nt!CcGetVirtualAddress+0x38a
    fffff880`09db36a0 fffff880`012c5f08 : fffff880`00000000 00000000`00000005 fffffa80`0b862e60 fffffa80`00000001 : nt!CcCopyRead+0x132
    fffff880`09db3760 fffff880`010c6098 : fffffa80`0ba26dc0 fffffa80`0b862df8 00000000`00000000 fffffa80`0ba26e01 : Ntfs!NtfsCopyReadA+0x1a8
    fffff880`09db3940 fffff880`010c98ba : fffff880`09db3a10 00000000`f0251e03 00000000`f0251e00 fffffa80`0ba26d00 : fltmgr!FltpPerformFastIoCall+0x88
    fffff880`09db39a0 fffff880`010e7630 : fffffa80`0ba26dc0 00000000`00000000 fffff880`09db3b00 00000000`000000bb : fltmgr!FltpPassThroughFastIo+0xda
    fffff880`09db39e0 fffff800`033ad539 : fffffa80`0ba26dc0 fffffa80`00000001 fffffa80`06a69260 fffffa80`0ba26dc0 : fltmgr!FltpFastIoRead+0x1d0
    fffff880`09db3a80 fffff800`030c7453 : 00000000`000002b8 00000000`00000000 00000000`00000000 00000000`00000000 : nt!NtReadFile+0x417
    fffff880`09db3b70 00000000`74682e09 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x13 (TrapFrame @ fffff880`09db3be0)
    00000000`04d8f0f8 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x74682e09
    1: kd> ,trap fffff880`09db3be0
           ^ Syntax error in ',trap fffff880`09db3be0'
    1: kd> .trap fffff880`09db3be0
    NOTE: The trap frame does not contain all registers.
    Some register values may be zeroed or incorrect.
    rax=00000000eaf7fcc0 rbx=0000000000000000 rcx=0000000004e9f3f8
    rdx=0000000000000000 rsi=0000000000000000 rdi=0000000000000000
    rip=0000000074682e09 rsp=0000000004d8f0f8 rbp=0000000006d0fe68
     r8=000000000000002b  r9=00000000770dfc2a r10=0000000000000000
    r11=0000000004d8e810 r12=0000000000000000 r13=0000000000000000
    r14=0000000000000000 r15=0000000000000000
    iopl=0         nv up ei pl zr na po nc
    0033:00000000`74682e09 ??              ???
    1: kd> kv
      *** Stack trace for last set context - .thread/.cxr resets it
    Child-SP          RetAddr           : Args to Child                                                           : Call Site
    00000000`04d8f0f8 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x74682e09
      My Computer


 
Page 1 of 9 123 ... LastLast

  Related Discussions
Our Sites
Site Links
About Us
Windows 7 Forums is an independent web site and has not been authorized, sponsored, or otherwise approved by Microsoft Corporation. "Windows 7" and related materials are trademarks of Microsoft Corp.

© Designer Media Ltd
All times are GMT -5. The time now is 13:07.
Find Us