New
#11
Bump for help.
Good morning,
Posted the dump file about 4 days ago and wondered if someone would look at it.
Thanks.
Hi slodoc259. I did not post there as I wanted to avoid any chance of conflict of suggestions.
The BSOD is not showing any finite probable cause. Test your RAM modules for possible errors.
How to Test and Diagnose RAM Issues with Memtest86+
Run memtest for at least 8 passes, preferably overnight.
If it start showing errors/red lines, stop testing. A single error is enough to determine that something is going bad there.
If memtest comes free from errors, enable Driver Verifier to monitor the drivers.
Driver Verifier - Enable and Disable
Run Driver Verifier for 24 hours or the occurrence of the next crash, whichever is earlier.
InformationWhy Driver Verifier:
It puts a stress on the drivers, ans so it makes the unstable drivers crash. Hopefully the driver that crashes is recorded in the memory dump.
How Can we know that DV is enabled:
It will make the system bit of slow, laggy.
WarningBefore enabling DV, make it sure that you have earlier System restore points made in your computer. You can check it easily by using CCleaner looking at Tools > System Restore.
If there is no points, make a System Restore Point manually before enabling DV.
Let us know the results, with the subsequent crash dumps, if any. Post it following the Blue Screen of Death (BSOD) Posting Instructions.Tip
- If you fail to get on the Desktop because of DV, Boot into Advanced Boot Options > Safe mode. Disable DV there. Now boot normally again, and try following the instruction of enabling DV again.
- If you cannot boot in Safe mode too, do a System Restore to a point you made earlier.
____________________________________________________________________
Code:******************************************************************************* * * * Bugcheck Analysis * * * ******************************************************************************* Use !analyze -v to get detailed debugging information. BugCheck A, {fffffa80c031f8a0, 2, 1, fffff800036ba150} Probably caused by : memory_corruption ( nt!MiReplenishPageSlist+c0 ) Followup: MachineOwner --------- 4: kd> !analyze -v ******************************************************************************* * * * Bugcheck Analysis * * * ******************************************************************************* IRQL_NOT_LESS_OR_EQUAL (a) An attempt was made to access a pageable (or completely invalid) address at an interrupt request level (IRQL) that is too high. This is usually caused by drivers using improper addresses. If a kernel debugger is available get the stack backtrace. Arguments: Arg1: fffffa80c031f8a0, memory referenced Arg2: 0000000000000002, IRQL Arg3: 0000000000000001, bitfield : bit 0 : value 0 = read operation, 1 = write operation bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status) Arg4: fffff800036ba150, address which referenced memory Debugging Details: ------------------ WRITE_ADDRESS: GetPointerFromAddress: unable to read from fffff800038cc100 GetUlongFromAddress: unable to read from fffff800038cc1c0 fffffa80c031f8a0 Nonpaged pool CURRENT_IRQL: 2 FAULTING_IP: nt!MiReplenishPageSlist+c0 fffff800`036ba150 f00fba6b1000 lock bts dword ptr [rbx+10h],0 CUSTOMER_CRASH_COUNT: 1 DEFAULT_BUCKET_ID: WIN7_DRIVER_FAULT BUGCHECK_STR: 0xA PROCESS_NAME: chrome.exe TRAP_FRAME: fffff8800d097350 -- (.trap 0xfffff8800d097350) NOTE: The trap frame does not contain all registers. Some register values may be zeroed or incorrect. rax=0000000000000000 rbx=0000000000000000 rcx=000000000000000c rdx=000000000cee9010 rsi=0000000000000000 rdi=0000000000000000 rip=00000000024caefc rsp=00000000003def70 rbp=00000000003def78 r8=000000000000002b r9=0000000074ee5758 r10=0000000000000000 r11=0000000000000246 r12=0000000000000000 r13=0000000000000000 r14=0000000000000000 r15=0000000000000000 iopl=0 nv up ei pl nz na po nc 0023:024caefc ?? ??? Resetting default scope LAST_CONTROL_TRANSFER: from fffff80003694129 to fffff80003694b80 STACK_TEXT: fffff880`0d096d88 fffff800`03694129 : 00000000`0000000a fffffa80`c031f8a0 00000000`00000002 00000000`00000001 : nt!KeBugCheckEx fffff880`0d096d90 fffff800`03692da0 : fffffa80`1160db50 00000000`00000000 00000000`02170000 fffffa80`c031f890 : nt!KiBugCheckDispatch+0x69 fffff880`0d096ed0 fffff800`036ba150 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiPageFault+0x260 fffff880`0d097060 fffff800`036b890f : fffffa80`0cbd0078 00000000`00000003 fffffa80`00321090 00000000`00000003 : nt!MiReplenishPageSlist+0xc0 fffff880`0d0970d0 fffff800`036a2044 : 00000000`00000000 00000000`00000002 00000000`00000000 ffffffff`ffffffff : nt!MiRemoveAnyPage+0x24f fffff880`0d0971f0 fffff800`03692cae : 00000000`00000001 00000000`0cee9000 00000000`00000001 00000000`0c412d78 : nt!MmAccessFault+0x1224 fffff880`0d097350 00000000`024caefc : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiPageFault+0x16e 00000000`003def70 fffff800`0368c1d0 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x24caefc fffff880`0d097530 00000000`ffffffff : fffff8a0`136d3810 fffff880`0d097900 fffff8a0`13182530 00000000`00000200 : nt!KiCallUserMode fffff880`0d097538 fffff8a0`136d3810 : fffff880`0d097900 fffff8a0`13182530 00000000`00000200 fffff880`0d097c70 : 0xffffffff fffff880`0d097540 fffff880`0d097900 : fffff8a0`13182530 00000000`00000200 fffff880`0d097c70 00000000`0000ffc0 : 0xfffff8a0`136d3810 fffff880`0d097548 fffff8a0`13182530 : 00000000`00000200 fffff880`0d097c70 00000000`0000ffc0 00000000`0000ffc0 : 0xfffff880`0d097900 fffff880`0d097550 00000000`00000200 : fffff880`0d097c70 00000000`0000ffc0 00000000`0000ffc0 414b7740`3ffffffa : 0xfffff8a0`13182530 fffff880`0d097558 fffff880`0d097c70 : 00000000`0000ffc0 00000000`0000ffc0 414b7740`3ffffffa 00000000`00000000 : 0x200 fffff880`0d097560 00000000`0000ffc0 : 00000000`0000ffc0 414b7740`3ffffffa 00000000`00000000 00000000`00000000 : 0xfffff880`0d097c70 fffff880`0d097568 00000000`0000ffc0 : 414b7740`3ffffffa 00000000`00000000 00000000`00000000 00000000`00000000 : 0xffc0 fffff880`0d097570 414b7740`3ffffffa : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0xffc0 fffff880`0d097578 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x414b7740`3ffffffa STACK_COMMAND: kb FOLLOWUP_IP: nt!MiReplenishPageSlist+c0 fffff800`036ba150 f00fba6b1000 lock bts dword ptr [rbx+10h],0 SYMBOL_STACK_INDEX: 3 SYMBOL_NAME: nt!MiReplenishPageSlist+c0 FOLLOWUP_NAME: MachineOwner MODULE_NAME: nt DEBUG_FLR_IMAGE_TIMESTAMP: 51fb06cd IMAGE_NAME: memory_corruption FAILURE_BUCKET_ID: X64_0xA_nt!MiReplenishPageSlist+c0 BUCKET_ID: X64_0xA_nt!MiReplenishPageSlist+c0 Followup: MachineOwner ---------