BSOD Shortly After Began Using New Build

Page 2 of 2 FirstFirst 12

  1. Posts : 8
    Win 7 64 bit SP1
    Thread Starter

    Bump for help.
      My Computer

  2. Posts : 8
    Win 7 64 bit SP1
    Thread Starter

    Dump file posted

    Good morning,

    Posted the dump file about 4 days ago and wondered if someone would look at it.

      My Computer

  3. Arc
    Posts : 35,373
    Microsoft Windows 10 Pro Insider Preview 64-bit

    Hi slodoc259. I did not post there as I wanted to avoid any chance of conflict of suggestions.

    The BSOD is not showing any finite probable cause. Test your RAM modules for possible errors.
    How to Test and Diagnose RAM Issues with Memtest86+
    Run memtest for at least 8 passes, preferably overnight.

    If it start showing errors/red lines, stop testing. A single error is enough to determine that something is going bad there.

    If memtest comes free from errors, enable Driver Verifier to monitor the drivers.
    Driver Verifier - Enable and Disable
    Run Driver Verifier for 24 hours or the occurrence of the next crash, whichever is earlier.

    Why Driver Verifier:
    It puts a stress on the drivers, ans so it makes the unstable drivers crash. Hopefully the driver that crashes is recorded in the memory dump.

    How Can we know that DV is enabled:
    It will make the system bit of slow, laggy.

    Before enabling DV, make it sure that you have earlier System restore points made in your computer. You can check it easily by using CCleaner looking at Tools > System Restore.

    If there is no points, make a System Restore Point manually before enabling DV.


    Let us know the results, with the subsequent crash dumps, if any. Post it following the Blue Screen of Death (BSOD) Posting Instructions.
    *                                                                             *
    *                        Bugcheck Analysis                                    *
    *                                                                             *
    Use !analyze -v to get detailed debugging information.
    BugCheck A, {fffffa80c031f8a0, 2, 1, fffff800036ba150}
    Probably caused by : memory_corruption ( nt!MiReplenishPageSlist+c0 )
    Followup: MachineOwner
    4: kd> !analyze -v
    *                                                                             *
    *                        Bugcheck Analysis                                    *
    *                                                                             *
    An attempt was made to access a pageable (or completely invalid) address at an
    interrupt request level (IRQL) that is too high.  This is usually
    caused by drivers using improper addresses.
    If a kernel debugger is available get the stack backtrace.
    Arg1: fffffa80c031f8a0, memory referenced
    Arg2: 0000000000000002, IRQL
    Arg3: 0000000000000001, bitfield :
        bit 0 : value 0 = read operation, 1 = write operation
        bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
    Arg4: fffff800036ba150, address which referenced memory
    Debugging Details:
    WRITE_ADDRESS: GetPointerFromAddress: unable to read from fffff800038cc100
    GetUlongFromAddress: unable to read from fffff800038cc1c0
     fffffa80c031f8a0 Nonpaged pool
    fffff800`036ba150 f00fba6b1000    lock bts dword ptr [rbx+10h],0
    PROCESS_NAME:  chrome.exe
    TRAP_FRAME:  fffff8800d097350 -- (.trap 0xfffff8800d097350)
    NOTE: The trap frame does not contain all registers.
    Some register values may be zeroed or incorrect.
    rax=0000000000000000 rbx=0000000000000000 rcx=000000000000000c
    rdx=000000000cee9010 rsi=0000000000000000 rdi=0000000000000000
    rip=00000000024caefc rsp=00000000003def70 rbp=00000000003def78
     r8=000000000000002b  r9=0000000074ee5758 r10=0000000000000000
    r11=0000000000000246 r12=0000000000000000 r13=0000000000000000
    r14=0000000000000000 r15=0000000000000000
    iopl=0         nv up ei pl nz na po nc
    0023:024caefc ??              ???
    Resetting default scope
    LAST_CONTROL_TRANSFER:  from fffff80003694129 to fffff80003694b80
    fffff880`0d096d88 fffff800`03694129 : 00000000`0000000a fffffa80`c031f8a0 00000000`00000002 00000000`00000001 : nt!KeBugCheckEx
    fffff880`0d096d90 fffff800`03692da0 : fffffa80`1160db50 00000000`00000000 00000000`02170000 fffffa80`c031f890 : nt!KiBugCheckDispatch+0x69
    fffff880`0d096ed0 fffff800`036ba150 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiPageFault+0x260
    fffff880`0d097060 fffff800`036b890f : fffffa80`0cbd0078 00000000`00000003 fffffa80`00321090 00000000`00000003 : nt!MiReplenishPageSlist+0xc0
    fffff880`0d0970d0 fffff800`036a2044 : 00000000`00000000 00000000`00000002 00000000`00000000 ffffffff`ffffffff : nt!MiRemoveAnyPage+0x24f
    fffff880`0d0971f0 fffff800`03692cae : 00000000`00000001 00000000`0cee9000 00000000`00000001 00000000`0c412d78 : nt!MmAccessFault+0x1224
    fffff880`0d097350 00000000`024caefc : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiPageFault+0x16e
    00000000`003def70 fffff800`0368c1d0 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x24caefc
    fffff880`0d097530 00000000`ffffffff : fffff8a0`136d3810 fffff880`0d097900 fffff8a0`13182530 00000000`00000200 : nt!KiCallUserMode
    fffff880`0d097538 fffff8a0`136d3810 : fffff880`0d097900 fffff8a0`13182530 00000000`00000200 fffff880`0d097c70 : 0xffffffff
    fffff880`0d097540 fffff880`0d097900 : fffff8a0`13182530 00000000`00000200 fffff880`0d097c70 00000000`0000ffc0 : 0xfffff8a0`136d3810
    fffff880`0d097548 fffff8a0`13182530 : 00000000`00000200 fffff880`0d097c70 00000000`0000ffc0 00000000`0000ffc0 : 0xfffff880`0d097900
    fffff880`0d097550 00000000`00000200 : fffff880`0d097c70 00000000`0000ffc0 00000000`0000ffc0 414b7740`3ffffffa : 0xfffff8a0`13182530
    fffff880`0d097558 fffff880`0d097c70 : 00000000`0000ffc0 00000000`0000ffc0 414b7740`3ffffffa 00000000`00000000 : 0x200
    fffff880`0d097560 00000000`0000ffc0 : 00000000`0000ffc0 414b7740`3ffffffa 00000000`00000000 00000000`00000000 : 0xfffff880`0d097c70
    fffff880`0d097568 00000000`0000ffc0 : 414b7740`3ffffffa 00000000`00000000 00000000`00000000 00000000`00000000 : 0xffc0
    fffff880`0d097570 414b7740`3ffffffa : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0xffc0
    fffff880`0d097578 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x414b7740`3ffffffa
    fffff800`036ba150 f00fba6b1000    lock bts dword ptr [rbx+10h],0
    SYMBOL_NAME:  nt!MiReplenishPageSlist+c0
    FOLLOWUP_NAME:  MachineOwner
    IMAGE_NAME:  memory_corruption
    FAILURE_BUCKET_ID:  X64_0xA_nt!MiReplenishPageSlist+c0
    BUCKET_ID:  X64_0xA_nt!MiReplenishPageSlist+c0
    Followup: MachineOwner
      My Computer

Page 2 of 2 FirstFirst 12

  Related Discussions
Our Sites
Site Links
About Us
Windows 7 Forums is an independent web site and has not been authorized, sponsored, or otherwise approved by Microsoft Corporation. "Windows 7" and related materials are trademarks of Microsoft Corp.

Designer Media Ltd
All times are GMT -5. The time now is 02:32.
Find Us