Hey guys I am having some trouble with my Lenovo Laptop. A couple days ago I got multiple BSOD including IRQL_Not_Less_Or_Equal and Page_faul_in_nonpaged_area. I uninstalled my video card drivers and still had errors. I did a clean install of windows 8.1 and had the same issues.
the following is the code from my dump file. I am only getting BSOD during video games or on video sites like youtube. I might try another fresh install and go from there but will wait to here if there is any solutions. I crashed again with a youtube openpage_fault_in_nonpaged_area. The second memory dump is the newest one.
Microsoft (R) Windows Debugger Version 6.3.9600.17298 AMD64 Copyright (c) Microsoft Corporation. All rights reserved. Loading Dump File [C:\Windows\MEMORY.DMP] Kernel Bitmap Dump File: Only kernel address space is available ************* Symbol Path validation summary ************** Response Time (ms) Location Deferred SRV*C:\Windows\symbol_cache*http://msdl.microsoft.com/download/symbols Symbol search path is: SRV*C:\Windows\symbol_cache*http://msdl.microsoft.com/download/symbols Executable search path is: Windows 8 Kernel Version 9600 MP (8 procs) Free x64 Product: WinNt, suite: TerminalServer SingleUserTS Personal Built by: 9600.16404.amd64fre.winblue_gdr.130913-2141 Machine Name: Kernel base = 0xfffff803`94087000 PsLoadedModuleList = 0xfffff803`9434b990 Debug session time: Wed Feb 25 20:29:29.129 2015 (UTC - 6:00) System Uptime: 0 days 0:21:07.913 Loading Kernel Symbols ............................................................... ................................................................ .............Page 1416b8 not present in the dump file. Type ".hh dbgerr004" for details ...Page 14edef not present in the dump file. Type ".hh dbgerr004" for details ............................ Loading User Symbols PEB is paged out (Peb.Ldr = 00007ff6`b1d8e018). Type ".hh dbgerr001" for details Loading unloaded module list ........ ******************************************************************************* * * * Bugcheck Analysis * * * ******************************************************************************* Use !analyze -v to get detailed debugging information. BugCheck 3B, {c0000005, fffff803940de532, ffffd0002aebe740, 0} Probably caused by : memory_corruption ( nt!MiIdentifyPfn+322 ) Followup: MachineOwner --------- 4: kd> !analyze -v ******************************************************************************* * * * Bugcheck Analysis * * * ******************************************************************************* SYSTEM_SERVICE_EXCEPTION (3b) An exception happened while executing a system service routine. Arguments: Arg1: 00000000c0000005, Exception code that caused the bugcheck Arg2: fffff803940de532, Address of the instruction which caused the bugcheck Arg3: ffffd0002aebe740, Address of the context record for the exception that caused the bugcheck Arg4: 0000000000000000, zero. Debugging Details: ------------------ EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - The instruction at 0x%08lx referenced memory at 0x%08lx. The memory could not be %s. FAULTING_IP: nt!MiIdentifyPfn+322 fffff803`940de532 f0410fba6f481f lock bts dword ptr [r15+48h],1Fh CONTEXT: ffffd0002aebe740 -- (.cxr 0xffffd0002aebe740;r) rax=0800000000000020 rbx=ffffe000067567c8 rcx=0200000000000000 rdx=fffff803940de61a rsi=ffffc0000949b3c1 rdi=fffffa80052aa120 rip=fffff803940de532 rsp=ffffd0002aebf170 rbp=0000000000000000 r8=00000000001b8e06 r9=02200000001b466d r10=07008e0504420000 r11=0000000000000042 r12=0000000000000001 r13=ffffe00006756008 r14=ffffe0000a3f31a0 r15=808a818a808a818a iopl=0 nv up ei pl zr na po nc cs=0010 ss=0018 ds=002b es=002b fs=0053 gs=002b efl=00010246 nt!MiIdentifyPfn+0x322: fffff803`940de532 f0410fba6f481f lock bts dword ptr [r15+48h],1Fh ds:002b:808a818a`808a81d2=???????? Last set context: rax=0800000000000020 rbx=ffffe000067567c8 rcx=0200000000000000 rdx=fffff803940de61a rsi=ffffc0000949b3c1 rdi=fffffa80052aa120 rip=fffff803940de532 rsp=ffffd0002aebf170 rbp=0000000000000000 r8=00000000001b8e06 r9=02200000001b466d r10=07008e0504420000 r11=0000000000000042 r12=0000000000000001 r13=ffffe00006756008 r14=ffffe0000a3f31a0 r15=808a818a808a818a iopl=0 nv up ei pl zr na po nc cs=0010 ss=0018 ds=002b es=002b fs=0053 gs=002b efl=00010246 nt!MiIdentifyPfn+0x322: fffff803`940de532 f0410fba6f481f lock bts dword ptr [r15+48h],1Fh ds:002b:808a818a`808a81d2=???????? Resetting default scope DEFAULT_BUCKET_ID: WIN8_DRIVER_FAULT BUGCHECK_STR: 0x3B PROCESS_NAME: svchost.exe CURRENT_IRQL: 2 ANALYSIS_VERSION: 6.3.9600.17298 (debuggers(dbg).141024-1500) amd64fre LAST_CONTROL_TRANSFER: from fffff803940de1bc to fffff803940de532 STACK_TEXT: ffffd000`2aebf170 fffff803`940de1bc : 00000000`00000004 ffffe000`067567c8 00000000`00000001 ffffd000`2aebf320 : nt!MiIdentifyPfn+0x322 ffffd000`2aebf220 fffff803`9443f1bb : ffffe000`067567c8 ffffd000`2aebfb80 ffffe000`06756000 fffff803`42506650 : nt!MiIdentifyPfnWrapper+0x3c ffffd000`2aebf250 fffff803`94459e32 : ffffc000`04e64060 00000000`00000001 ffffd000`2aebf434 ffffe000`06756000 : nt!PfpPfnPrioRequest+0xbb ffffd000`2aebf2d0 fffff803`94457f9b : 00000073`a2e9abf0 ffffc000`09a334a0 00000000`0000004f 00000000`00000000 : nt!PfQuerySuperfetchInformation+0x336 ffffd000`2aebf400 fffff803`94457d49 : 00000073`a2e9abf0 00000073`a2e9ac60 00000000`00000000 00000000`000000a3 : nt!ExpQuerySystemInformation+0x1ff ffffd000`2aebfac0 fffff803`941e04b3 : ffffe000`0bcbb880 00000073`a2e9dbc0 00000074`a5ddcf60 00000074`a5ddcfa0 : nt!NtQuerySystemInformation+0x49 ffffd000`2aebfb00 00007ffa`68d668da : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x13 00000073`a2e9aaf8 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffa`68d668da FOLLOWUP_IP: nt!MiIdentifyPfn+322 fffff803`940de532 f0410fba6f481f lock bts dword ptr [r15+48h],1Fh SYMBOL_STACK_INDEX: 0 SYMBOL_NAME: nt!MiIdentifyPfn+322 FOLLOWUP_NAME: MachineOwner MODULE_NAME: nt DEBUG_FLR_IMAGE_TIMESTAMP: 52341cf4 IMAGE_VERSION: 6.3.9600.16404 STACK_COMMAND: .cxr 0xffffd0002aebe740 ; kb IMAGE_NAME: memory_corruption BUCKET_ID_FUNC_OFFSET: 322 FAILURE_BUCKET_ID: 0x3B_nt!MiIdentifyPfn BUCKET_ID: 0x3B_nt!MiIdentifyPfn ANALYSIS_SOURCE: KM FAILURE_ID_HASH_STRING: km:0x3b_nt!miidentifypfn FAILURE_ID_HASH: {ad62bbe5-c1e7-8084-3773-c8e3306de591} Followup: MachineOwner ---------
Microsoft (R) Windows Debugger Version 6.3.9600.17298 AMD64 Copyright (c) Microsoft Corporation. All rights reserved. Loading Dump File [C:\Windows\MEMORY.DMP] Kernel Bitmap Dump File: Only kernel address space is available ************* Symbol Path validation summary ************** Response Time (ms) Location Deferred SRV*C:\Windows\symbol_cache*http://msdl.microsoft.com/download/symbols Symbol search path is: SRV*C:\Windows\symbol_cache*http://msdl.microsoft.com/download/symbols Executable search path is: Windows 8 Kernel Version 9600 MP (8 procs) Free x64 Product: WinNt, suite: TerminalServer SingleUserTS Personal Built by: 9600.16404.amd64fre.winblue_gdr.130913-2141 Machine Name: Kernel base = 0xfffff802`2c473000 PsLoadedModuleList = 0xfffff802`2c737990 Debug session time: Wed Feb 25 21:06:58.295 2015 (UTC - 6:00) System Uptime: 0 days 0:31:17.078 Loading Kernel Symbols ............................................................... ................................................................ .............Page 13950b not present in the dump file. Type ".hh dbgerr004" for details ...Page 146142 not present in the dump file. Type ".hh dbgerr004" for details ............................ Loading User Symbols PEB is paged out (Peb.Ldr = 00007ff6`ee09f018). Type ".hh dbgerr001" for details Loading unloaded module list ........ ******************************************************************************* * * * Bugcheck Analysis * * * ******************************************************************************* Use !analyze -v to get detailed debugging information. BugCheck 3B, {c0000005, fffff8022c4ca532, ffffd000237ac740, 0} Page 14b50b not present in the dump file. Type ".hh dbgerr004" for details Probably caused by : memory_corruption ( nt!MiIdentifyPfn+322 ) Followup: MachineOwner --------- 3: kd> !analyze -v ******************************************************************************* * * * Bugcheck Analysis * * * ******************************************************************************* SYSTEM_SERVICE_EXCEPTION (3b) An exception happened while executing a system service routine. Arguments: Arg1: 00000000c0000005, Exception code that caused the bugcheck Arg2: fffff8022c4ca532, Address of the instruction which caused the bugcheck Arg3: ffffd000237ac740, Address of the context record for the exception that caused the bugcheck Arg4: 0000000000000000, zero. Debugging Details: ------------------ Page 14b50b not present in the dump file. Type ".hh dbgerr004" for details EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - The instruction at 0x%08lx referenced memory at 0x%08lx. The memory could not be %s. FAULTING_IP: nt!MiIdentifyPfn+322 fffff802`2c4ca532 f0410fba6f481f lock bts dword ptr [r15+48h],1Fh CONTEXT: ffffd000237ac740 -- (.cxr 0xffffd000237ac740;r) rax=0200000000000020 rbx=ffffe0000d36ef48 rcx=0200000000000000 rdx=fffff8022c4ca61a rsi=ffffc00001713e59 rdi=fffffa80052a8020 rip=fffff8022c4ca532 rsp=ffffd000237ad170 rbp=0000000000000000 r8=00000000001b8d56 r9=02e000000013e59d r10=d5006bd701420000 r11=0000000000000042 r12=0000000000000001 r13=ffffe0000d36e008 r14=ffffe00008aa8b50 r15=808a818a808a818a iopl=0 nv up ei pl zr na po nc cs=0010 ss=0018 ds=002b es=002b fs=0053 gs=002b efl=00010246 nt!MiIdentifyPfn+0x322: fffff802`2c4ca532 f0410fba6f481f lock bts dword ptr [r15+48h],1Fh ds:002b:808a818a`808a81d2=???????? Last set context: rax=0200000000000020 rbx=ffffe0000d36ef48 rcx=0200000000000000 rdx=fffff8022c4ca61a rsi=ffffc00001713e59 rdi=fffffa80052a8020 rip=fffff8022c4ca532 rsp=ffffd000237ad170 rbp=0000000000000000 r8=00000000001b8d56 r9=02e000000013e59d r10=d5006bd701420000 r11=0000000000000042 r12=0000000000000001 r13=ffffe0000d36e008 r14=ffffe00008aa8b50 r15=808a818a808a818a iopl=0 nv up ei pl zr na po nc cs=0010 ss=0018 ds=002b es=002b fs=0053 gs=002b efl=00010246 nt!MiIdentifyPfn+0x322: fffff802`2c4ca532 f0410fba6f481f lock bts dword ptr [r15+48h],1Fh ds:002b:808a818a`808a81d2=???????? Resetting default scope DEFAULT_BUCKET_ID: WIN8_DRIVER_FAULT BUGCHECK_STR: 0x3B PROCESS_NAME: svchost.exe CURRENT_IRQL: 2 ANALYSIS_VERSION: 6.3.9600.17298 (debuggers(dbg).141024-1500) amd64fre LAST_CONTROL_TRANSFER: from fffff8022c4ca1bc to fffff8022c4ca532 STACK_TEXT: ffffd000`237ad170 fffff802`2c4ca1bc : 00000000`00000004 ffffe000`0d36ef48 00000000`00000001 ffffd000`237ad320 : nt!MiIdentifyPfn+0x322 ffffd000`237ad220 fffff802`2c82b1bb : ffffe000`0d36ef48 ffffd000`237adb80 ffffe000`0d36e000 ffffd000`42506650 : nt!MiIdentifyPfnWrapper+0x3c ffffd000`237ad250 fffff802`2c845e32 : ffffc000`09d96060 00000000`00000001 ffffd000`237ad434 ffffe000`0d36e000 : nt!PfpPfnPrioRequest+0xbb ffffd000`237ad2d0 fffff802`2c843f9b : 00000094`c48eac10 ffffc000`09d5a620 00000000`0000004f 00000000`00000000 : nt!PfQuerySuperfetchInformation+0x336 ffffd000`237ad400 fffff802`2c843d49 : 00000094`c48eac10 00000094`c48eac80 00000000`00000000 00000000`0000000a : nt!ExpQuerySystemInformation+0x1ff ffffd000`237adac0 fffff802`2c5cc4b3 : ffffe000`0be65080 00000094`c48edbf0 00000095`c8b2c1c0 00000095`c8b2c200 : nt!NtQuerySystemInformation+0x49 ffffd000`237adb00 00007ffb`962568da : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x13 00000094`c48eab28 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffb`962568da FOLLOWUP_IP: nt!MiIdentifyPfn+322 fffff802`2c4ca532 f0410fba6f481f lock bts dword ptr [r15+48h],1Fh SYMBOL_STACK_INDEX: 0 SYMBOL_NAME: nt!MiIdentifyPfn+322 FOLLOWUP_NAME: MachineOwner MODULE_NAME: nt DEBUG_FLR_IMAGE_TIMESTAMP: 52341cf4 IMAGE_VERSION: 6.3.9600.16404 STACK_COMMAND: .cxr 0xffffd000237ac740 ; kb IMAGE_NAME: memory_corruption BUCKET_ID_FUNC_OFFSET: 322 FAILURE_BUCKET_ID: 0x3B_nt!MiIdentifyPfn BUCKET_ID: 0x3B_nt!MiIdentifyPfn ANALYSIS_SOURCE: KM FAILURE_ID_HASH_STRING: km:0x3b_nt!miidentifypfn FAILURE_ID_HASH: {ad62bbe5-c1e7-8084-3773-c8e3306de591} Followup: MachineOwner --------- 3: kd> .cxr 0xffffd000237ac740;r rax=0200000000000020 rbx=ffffe0000d36ef48 rcx=0200000000000000 rdx=fffff8022c4ca61a rsi=ffffc00001713e59 rdi=fffffa80052a8020 rip=fffff8022c4ca532 rsp=ffffd000237ad170 rbp=0000000000000000 r8=00000000001b8d56 r9=02e000000013e59d r10=d5006bd701420000 r11=0000000000000042 r12=0000000000000001 r13=ffffe0000d36e008 r14=ffffe00008aa8b50 r15=808a818a808a818a iopl=0 nv up ei pl zr na po nc cs=0010 ss=0018 ds=002b es=002b fs=0053 gs=002b efl=00010246 nt!MiIdentifyPfn+0x322: fffff802`2c4ca532 f0410fba6f481f lock bts dword ptr [r15+48h],1Fh ds:002b:808a818a`808a81d2=???????? Last set context: rax=0200000000000020 rbx=ffffe0000d36ef48 rcx=0200000000000000 rdx=fffff8022c4ca61a rsi=ffffc00001713e59 rdi=fffffa80052a8020 rip=fffff8022c4ca532 rsp=ffffd000237ad170 rbp=0000000000000000 r8=00000000001b8d56 r9=02e000000013e59d r10=d5006bd701420000 r11=0000000000000042 r12=0000000000000001 r13=ffffe0000d36e008 r14=ffffe00008aa8b50 r15=808a818a808a818a iopl=0 nv up ei pl zr na po nc cs=0010 ss=0018 ds=002b es=002b fs=0053 gs=002b efl=00010246 nt!MiIdentifyPfn+0x322: fffff802`2c4ca532 f0410fba6f481f lock bts dword ptr [r15+48h],1Fh ds:002b:808a818a`808a81d2=????????
- Edited by TacoTruck 8 hours 33 minutes ago