W
WizlaDnB
Guest
I've had the PC a couple of months and have been constantly plauged by random blue screens.
Was a prebuilt from a company here in UK and I could send the whole system back to be tested but I'd much rather try and narrow it down to a bad part/driver etc.
Had to RMA a RTX 2070 after it completely failed I thought the blue screens were due too that but I am still getting them after the replacement has been sent out.
I've double checked all drivers are up to date, have ran windows memory diagnostic a couple of times (no errors found). I am planning on getting a usb to run Memtest, if its bad RAM I should be able to get them replaced easily.
Would anyone be able to decode this and tell me if its a specific driver causing this problem? I dont really know what i'm looking at when it comes to crash logs.
***
DRIVER_IRQL_NOT_LESS_OR_EQUAL (d1)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high. This is usually
caused by drivers using improper addresses.
If kernel debugger is available get stack backtrace.
Arguments:
Arg1: ffffe30b3ca0200c, memory referenced
Arg2: 0000000000000008, IRQL
Arg3: 0000000000000000, value 0 = read operation, 1 = write operation
Arg4: fffff80076028f06, address which referenced memory
Debugging Details:
------------------
TRIAGER: Could not open triage file : e:\dump_analysis\program\triage\modclass.ini, error 2
READ_ADDRESS: unable to get nt!MmSpecialPoolStart
unable to get nt!MmSpecialPoolEnd
unable to get nt!MmPagedPoolEnd
unable to get nt!MmNonPagedPoolStart
unable to get nt!MmSizeOfNonPagedPoolInBytes
ffffe30b3ca0200c
CURRENT_IRQL: 8
FAULTING_IP:
nvlddmkm+348f06
fffff800
fffff800
fffff800
fffff800
fffff800
STACK_COMMAND: kb
SYMBOL_NAME: PAGE_NOT_ZERO
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: Unknown_Module
IMAGE_NAME: Unknown_Image
DEBUG_FLR_IMAGE_TIMESTAMP: 0
BUCKET_ID: PAGE_NOT_ZERO
Followup: MachineOwner
---------
*** Memory manager detected 68449 instance(s) of page corruption, target is likely to have memory corruption.
More...
Was a prebuilt from a company here in UK and I could send the whole system back to be tested but I'd much rather try and narrow it down to a bad part/driver etc.
Had to RMA a RTX 2070 after it completely failed I thought the blue screens were due too that but I am still getting them after the replacement has been sent out.
I've double checked all drivers are up to date, have ran windows memory diagnostic a couple of times (no errors found). I am planning on getting a usb to run Memtest, if its bad RAM I should be able to get them replaced easily.
Would anyone be able to decode this and tell me if its a specific driver causing this problem? I dont really know what i'm looking at when it comes to crash logs.
***
- *
- Bugcheck Analysis *
- *
DRIVER_IRQL_NOT_LESS_OR_EQUAL (d1)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high. This is usually
caused by drivers using improper addresses.
If kernel debugger is available get stack backtrace.
Arguments:
Arg1: ffffe30b3ca0200c, memory referenced
Arg2: 0000000000000008, IRQL
Arg3: 0000000000000000, value 0 = read operation, 1 = write operation
Arg4: fffff80076028f06, address which referenced memory
Debugging Details:
------------------
TRIAGER: Could not open triage file : e:\dump_analysis\program\triage\modclass.ini, error 2
READ_ADDRESS: unable to get nt!MmSpecialPoolStart
unable to get nt!MmSpecialPoolEnd
unable to get nt!MmPagedPoolEnd
unable to get nt!MmNonPagedPoolStart
unable to get nt!MmSizeOfNonPagedPoolInBytes
ffffe30b3ca0200c
CURRENT_IRQL: 8
FAULTING_IP:
nvlddmkm+348f06
fffff800
76028f06 458b44d10c mov r8d,dword ptr [r9+rdx*8+0Ch]
DEFAULT_BUCKET_ID: WIN8_DRIVER_FAULT
BUGCHECK_STR: AV
PROCESS_NAME: System
BAD_PAGES_DETECTED: 10b61
TRAP_FRAME: fffff8005ec137f0 -- (.trap 0xfffff8005ec137f0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000000 rbx=0000000000000000 rcx=2906c5a4f96a0000
rdx=000000000018d1b2 rsi=0000000000000000 rdi=0000000000000000
rip=fffff80076028f06 rsp=fffff8005ec13980 rbp=ffffe30b3bfa6000
r8=0000000000000000 r9=ffffe30b3bd99270 r10=0000000000000000
r11=fffff8005ec138d0 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei pl nz ac po nc
nvlddmkm+0x348f06:
fffff800
76028f06 458b44d10c mov r8d,dword ptr [r9+rdx*8+0Ch] ds:ffffe30b3ca0200c=????????
Resetting default scope
LAST_CONTROL_TRANSFER: from fffff8005be6cd69 to fffff8005be5b5e0
STACK_TEXT:
fffff800
5ec136a8 fffff8005be6cd69 : 00000000
0000000a ffffe30b3ca0200c 00000000
00000008 0000000000000000 : nt!KeBugCheckEx
fffff800
5ec136b0 fffff8005be6918e : 0000000b
5be6656e 0000000b5be6c3bb fffff800
00000008 fffff8007602a139 : nt!KiBugCheckDispatch+0x69
fffff800
5ec137f0 fffff80076028f06 : 00000000
000c55f6 ffffe30b03c91100 00000000
00009da0 ffffe30b3a8a8128 : nt!KiPageFault+0x44e
fffff800
5ec13980 00000000000c55f6 : ffffe30b
03c91100 0000000000009da0 ffffe30b
3a8a8128 ffffe30b3bd99270 : nvlddmkm+0x348f06
fffff800
5ec13988 ffffe30b03c91100 : 00000000
00009da0 ffffe30b3a8a8128 ffffe30b
3bd99270 0000000000b81000 : 0xc55f6
fffff800
5ec13990 0000000000009da0 : ffffe30b
3a8a8128 ffffe30b3bd99270 00000000
00b81000 fffff8005ec13b30 : 0xffffe30b
03c91100fffff800
5ec13998 ffffe30b
3a8a8128 : ffffe30b3bd99270 00000000
00b81000 fffff8005ec13b30 00000000
00000000 : 0x9da0fffff800
5ec139a0 ffffe30b
3bd99270 : 0000000000b81000 fffff800
5ec13b30 0000000000000000 ffffe30b
3bfeec30 : 0xffffe30b3a8a8128
fffff800
5ec139a8 0000000000b81000 : fffff800
5ec13b30 0000000000000000 ffffe30b
3bfeec30 ffffe30b3bfeec30 : 0xffffe30b
3bd99270fffff800
5ec139b0 fffff800
5ec13b30 : 0000000000000000 ffffe30b
3bfeec30 ffffe30b3bfeec30 00000000
00000000 : 0xb81000fffff800
5ec139b8 00000000
00000000 : ffffe30b3bfeec30 ffffe30b
3bfeec30 0000000000000000 fffff800
7602a32e : 0xfffff800`5ec13b30STACK_COMMAND: kb
SYMBOL_NAME: PAGE_NOT_ZERO
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: Unknown_Module
IMAGE_NAME: Unknown_Image
DEBUG_FLR_IMAGE_TIMESTAMP: 0
BUCKET_ID: PAGE_NOT_ZERO
Followup: MachineOwner
---------
*** Memory manager detected 68449 instance(s) of page corruption, target is likely to have memory corruption.
More...