multiple BSOD errors

Hey guys I am having some trouble with my Lenovo Laptop. A couple days ago I got multiple BSOD including IRQL_Not_Less_Or_Equal and Page_faul_in_nonpaged_area. I uninstalled my video card drivers and still had errors. I did a clean install of windows 8.1 and had the same issues. 

the following is the code from my dump file. I am only getting BSOD during video games or on video sites like youtube. I might try another fresh install and go from there but will wait to here if there is any solutions. I crashed again with a youtube openpage_fault_in_nonpaged_area. The second memory dump is the newest one.

Microsoft (R) Windows Debugger Version 6.3.9600.17298 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.


Loading Dump File [C:\Windows\MEMORY.DMP]
Kernel Bitmap Dump File: Only kernel address space is available


************* Symbol Path validation summary **************
Response                         Time (ms)     Location
Deferred                                       SRV*C:\Windows\symbol_cache*http://msdl.microsoft.com/download/symbols
Symbol search path is: SRV*C:\Windows\symbol_cache*http://msdl.microsoft.com/download/symbols
Executable search path is: 
Windows 8 Kernel Version 9600 MP (8 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS Personal
Built by: 9600.16404.amd64fre.winblue_gdr.130913-2141
Machine Name:
Kernel base = 0xfffff803`94087000 PsLoadedModuleList = 0xfffff803`9434b990
Debug session time: Wed Feb 25 20:29:29.129 2015 (UTC - 6:00)
System Uptime: 0 days 0:21:07.913
Loading Kernel Symbols
...............................................................
................................................................
.............Page 1416b8 not present in the dump file. Type ".hh dbgerr004" for details
...Page 14edef not present in the dump file. Type ".hh dbgerr004" for details
............................
Loading User Symbols
PEB is paged out (Peb.Ldr = 00007ff6`b1d8e018).  Type ".hh dbgerr001" for details
Loading unloaded module list
........
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

Use !analyze -v to get detailed debugging information.

BugCheck 3B, {c0000005, fffff803940de532, ffffd0002aebe740, 0}

Probably caused by : memory_corruption ( nt!MiIdentifyPfn+322 )

Followup: MachineOwner
---------

4: kd> !analyze -v
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

SYSTEM_SERVICE_EXCEPTION (3b)
An exception happened while executing a system service routine.
Arguments:
Arg1: 00000000c0000005, Exception code that caused the bugcheck
Arg2: fffff803940de532, Address of the instruction which caused the bugcheck
Arg3: ffffd0002aebe740, Address of the context record for the exception that caused the bugcheck
Arg4: 0000000000000000, zero.

Debugging Details:
------------------


EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - The instruction at 0x%08lx referenced memory at 0x%08lx. The memory could not be %s.

FAULTING_IP: 
nt!MiIdentifyPfn+322
fffff803`940de532 f0410fba6f481f  lock bts dword ptr [r15+48h],1Fh

CONTEXT:  ffffd0002aebe740 -- (.cxr 0xffffd0002aebe740;r)
rax=0800000000000020 rbx=ffffe000067567c8 rcx=0200000000000000
rdx=fffff803940de61a rsi=ffffc0000949b3c1 rdi=fffffa80052aa120
rip=fffff803940de532 rsp=ffffd0002aebf170 rbp=0000000000000000
 r8=00000000001b8e06  r9=02200000001b466d r10=07008e0504420000
r11=0000000000000042 r12=0000000000000001 r13=ffffe00006756008
r14=ffffe0000a3f31a0 r15=808a818a808a818a
iopl=0         nv up ei pl zr na po nc
cs=0010  ss=0018  ds=002b  es=002b  fs=0053  gs=002b             efl=00010246
nt!MiIdentifyPfn+0x322:
fffff803`940de532 f0410fba6f481f  lock bts dword ptr [r15+48h],1Fh ds:002b:808a818a`808a81d2=????????
Last set context:
rax=0800000000000020 rbx=ffffe000067567c8 rcx=0200000000000000
rdx=fffff803940de61a rsi=ffffc0000949b3c1 rdi=fffffa80052aa120
rip=fffff803940de532 rsp=ffffd0002aebf170 rbp=0000000000000000
 r8=00000000001b8e06  r9=02200000001b466d r10=07008e0504420000
r11=0000000000000042 r12=0000000000000001 r13=ffffe00006756008
r14=ffffe0000a3f31a0 r15=808a818a808a818a
iopl=0         nv up ei pl zr na po nc
cs=0010  ss=0018  ds=002b  es=002b  fs=0053  gs=002b             efl=00010246
nt!MiIdentifyPfn+0x322:
fffff803`940de532 f0410fba6f481f  lock bts dword ptr [r15+48h],1Fh ds:002b:808a818a`808a81d2=????????
Resetting default scope

DEFAULT_BUCKET_ID:  WIN8_DRIVER_FAULT

BUGCHECK_STR:  0x3B

PROCESS_NAME:  svchost.exe

CURRENT_IRQL:  2

ANALYSIS_VERSION: 6.3.9600.17298 (debuggers(dbg).141024-1500) amd64fre

LAST_CONTROL_TRANSFER:  from fffff803940de1bc to fffff803940de532

STACK_TEXT:  
ffffd000`2aebf170 fffff803`940de1bc : 00000000`00000004 ffffe000`067567c8 00000000`00000001 ffffd000`2aebf320 : nt!MiIdentifyPfn+0x322
ffffd000`2aebf220 fffff803`9443f1bb : ffffe000`067567c8 ffffd000`2aebfb80 ffffe000`06756000 fffff803`42506650 : nt!MiIdentifyPfnWrapper+0x3c
ffffd000`2aebf250 fffff803`94459e32 : ffffc000`04e64060 00000000`00000001 ffffd000`2aebf434 ffffe000`06756000 : nt!PfpPfnPrioRequest+0xbb
ffffd000`2aebf2d0 fffff803`94457f9b : 00000073`a2e9abf0 ffffc000`09a334a0 00000000`0000004f 00000000`00000000 : nt!PfQuerySuperfetchInformation+0x336
ffffd000`2aebf400 fffff803`94457d49 : 00000073`a2e9abf0 00000073`a2e9ac60 00000000`00000000 00000000`000000a3 : nt!ExpQuerySystemInformation+0x1ff
ffffd000`2aebfac0 fffff803`941e04b3 : ffffe000`0bcbb880 00000073`a2e9dbc0 00000074`a5ddcf60 00000074`a5ddcfa0 : nt!NtQuerySystemInformation+0x49
ffffd000`2aebfb00 00007ffa`68d668da : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x13
00000073`a2e9aaf8 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffa`68d668da


FOLLOWUP_IP: 
nt!MiIdentifyPfn+322
fffff803`940de532 f0410fba6f481f  lock bts dword ptr [r15+48h],1Fh

SYMBOL_STACK_INDEX:  0

SYMBOL_NAME:  nt!MiIdentifyPfn+322

FOLLOWUP_NAME:  MachineOwner

MODULE_NAME: nt

DEBUG_FLR_IMAGE_TIMESTAMP:  52341cf4

IMAGE_VERSION:  6.3.9600.16404

STACK_COMMAND:  .cxr 0xffffd0002aebe740 ; kb

IMAGE_NAME:  memory_corruption

BUCKET_ID_FUNC_OFFSET:  322

FAILURE_BUCKET_ID:  0x3B_nt!MiIdentifyPfn

BUCKET_ID:  0x3B_nt!MiIdentifyPfn

ANALYSIS_SOURCE:  KM

FAILURE_ID_HASH_STRING:  km:0x3b_nt!miidentifypfn

FAILURE_ID_HASH:  {ad62bbe5-c1e7-8084-3773-c8e3306de591}

Followup: MachineOwner
---------

Microsoft (R) Windows Debugger Version 6.3.9600.17298 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.


Loading Dump File [C:\Windows\MEMORY.DMP]
Kernel Bitmap Dump File: Only kernel address space is available


************* Symbol Path validation summary **************
Response                         Time (ms)     Location
Deferred                                       SRV*C:\Windows\symbol_cache*http://msdl.microsoft.com/download/symbols
Symbol search path is: SRV*C:\Windows\symbol_cache*http://msdl.microsoft.com/download/symbols
Executable search path is: 
Windows 8 Kernel Version 9600 MP (8 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS Personal
Built by: 9600.16404.amd64fre.winblue_gdr.130913-2141
Machine Name:
Kernel base = 0xfffff802`2c473000 PsLoadedModuleList = 0xfffff802`2c737990
Debug session time: Wed Feb 25 21:06:58.295 2015 (UTC - 6:00)
System Uptime: 0 days 0:31:17.078
Loading Kernel Symbols
...............................................................
................................................................
.............Page 13950b not present in the dump file. Type ".hh dbgerr004" for details
...Page 146142 not present in the dump file. Type ".hh dbgerr004" for details
............................
Loading User Symbols
PEB is paged out (Peb.Ldr = 00007ff6`ee09f018).  Type ".hh dbgerr001" for details
Loading unloaded module list
........
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

Use !analyze -v to get detailed debugging information.

BugCheck 3B, {c0000005, fffff8022c4ca532, ffffd000237ac740, 0}

Page 14b50b not present in the dump file. Type ".hh dbgerr004" for details
Probably caused by : memory_corruption ( nt!MiIdentifyPfn+322 )

Followup: MachineOwner
---------

3: kd> !analyze -v
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

SYSTEM_SERVICE_EXCEPTION (3b)
An exception happened while executing a system service routine.
Arguments:
Arg1: 00000000c0000005, Exception code that caused the bugcheck
Arg2: fffff8022c4ca532, Address of the instruction which caused the bugcheck
Arg3: ffffd000237ac740, Address of the context record for the exception that caused the bugcheck
Arg4: 0000000000000000, zero.

Debugging Details:
------------------

Page 14b50b not present in the dump file. Type ".hh dbgerr004" for details

EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - The instruction at 0x%08lx referenced memory at 0x%08lx. The memory could not be %s.

FAULTING_IP: 
nt!MiIdentifyPfn+322
fffff802`2c4ca532 f0410fba6f481f  lock bts dword ptr [r15+48h],1Fh

CONTEXT:  ffffd000237ac740 -- (.cxr 0xffffd000237ac740;r)
rax=0200000000000020 rbx=ffffe0000d36ef48 rcx=0200000000000000
rdx=fffff8022c4ca61a rsi=ffffc00001713e59 rdi=fffffa80052a8020
rip=fffff8022c4ca532 rsp=ffffd000237ad170 rbp=0000000000000000
 r8=00000000001b8d56  r9=02e000000013e59d r10=d5006bd701420000
r11=0000000000000042 r12=0000000000000001 r13=ffffe0000d36e008
r14=ffffe00008aa8b50 r15=808a818a808a818a
iopl=0         nv up ei pl zr na po nc
cs=0010  ss=0018  ds=002b  es=002b  fs=0053  gs=002b             efl=00010246
nt!MiIdentifyPfn+0x322:
fffff802`2c4ca532 f0410fba6f481f  lock bts dword ptr [r15+48h],1Fh ds:002b:808a818a`808a81d2=????????
Last set context:
rax=0200000000000020 rbx=ffffe0000d36ef48 rcx=0200000000000000
rdx=fffff8022c4ca61a rsi=ffffc00001713e59 rdi=fffffa80052a8020
rip=fffff8022c4ca532 rsp=ffffd000237ad170 rbp=0000000000000000
 r8=00000000001b8d56  r9=02e000000013e59d r10=d5006bd701420000
r11=0000000000000042 r12=0000000000000001 r13=ffffe0000d36e008
r14=ffffe00008aa8b50 r15=808a818a808a818a
iopl=0         nv up ei pl zr na po nc
cs=0010  ss=0018  ds=002b  es=002b  fs=0053  gs=002b             efl=00010246
nt!MiIdentifyPfn+0x322:
fffff802`2c4ca532 f0410fba6f481f  lock bts dword ptr [r15+48h],1Fh ds:002b:808a818a`808a81d2=????????
Resetting default scope

DEFAULT_BUCKET_ID:  WIN8_DRIVER_FAULT

BUGCHECK_STR:  0x3B

PROCESS_NAME:  svchost.exe

CURRENT_IRQL:  2

ANALYSIS_VERSION: 6.3.9600.17298 (debuggers(dbg).141024-1500) amd64fre

LAST_CONTROL_TRANSFER:  from fffff8022c4ca1bc to fffff8022c4ca532

STACK_TEXT:  
ffffd000`237ad170 fffff802`2c4ca1bc : 00000000`00000004 ffffe000`0d36ef48 00000000`00000001 ffffd000`237ad320 : nt!MiIdentifyPfn+0x322
ffffd000`237ad220 fffff802`2c82b1bb : ffffe000`0d36ef48 ffffd000`237adb80 ffffe000`0d36e000 ffffd000`42506650 : nt!MiIdentifyPfnWrapper+0x3c
ffffd000`237ad250 fffff802`2c845e32 : ffffc000`09d96060 00000000`00000001 ffffd000`237ad434 ffffe000`0d36e000 : nt!PfpPfnPrioRequest+0xbb
ffffd000`237ad2d0 fffff802`2c843f9b : 00000094`c48eac10 ffffc000`09d5a620 00000000`0000004f 00000000`00000000 : nt!PfQuerySuperfetchInformation+0x336
ffffd000`237ad400 fffff802`2c843d49 : 00000094`c48eac10 00000094`c48eac80 00000000`00000000 00000000`0000000a : nt!ExpQuerySystemInformation+0x1ff
ffffd000`237adac0 fffff802`2c5cc4b3 : ffffe000`0be65080 00000094`c48edbf0 00000095`c8b2c1c0 00000095`c8b2c200 : nt!NtQuerySystemInformation+0x49
ffffd000`237adb00 00007ffb`962568da : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x13
00000094`c48eab28 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffb`962568da


FOLLOWUP_IP: 
nt!MiIdentifyPfn+322
fffff802`2c4ca532 f0410fba6f481f  lock bts dword ptr [r15+48h],1Fh

SYMBOL_STACK_INDEX:  0

SYMBOL_NAME:  nt!MiIdentifyPfn+322

FOLLOWUP_NAME:  MachineOwner

MODULE_NAME: nt

DEBUG_FLR_IMAGE_TIMESTAMP:  52341cf4

IMAGE_VERSION:  6.3.9600.16404

STACK_COMMAND:  .cxr 0xffffd000237ac740 ; kb

IMAGE_NAME:  memory_corruption

BUCKET_ID_FUNC_OFFSET:  322

FAILURE_BUCKET_ID:  0x3B_nt!MiIdentifyPfn

BUCKET_ID:  0x3B_nt!MiIdentifyPfn

ANALYSIS_SOURCE:  KM

FAILURE_ID_HASH_STRING:  km:0x3b_nt!miidentifypfn

FAILURE_ID_HASH:  {ad62bbe5-c1e7-8084-3773-c8e3306de591}

Followup: MachineOwner
---------

3: kd> .cxr 0xffffd000237ac740;r
rax=0200000000000020 rbx=ffffe0000d36ef48 rcx=0200000000000000
rdx=fffff8022c4ca61a rsi=ffffc00001713e59 rdi=fffffa80052a8020
rip=fffff8022c4ca532 rsp=ffffd000237ad170 rbp=0000000000000000
 r8=00000000001b8d56  r9=02e000000013e59d r10=d5006bd701420000
r11=0000000000000042 r12=0000000000000001 r13=ffffe0000d36e008
r14=ffffe00008aa8b50 r15=808a818a808a818a
iopl=0         nv up ei pl zr na po nc
cs=0010  ss=0018  ds=002b  es=002b  fs=0053  gs=002b             efl=00010246
nt!MiIdentifyPfn+0x322:
fffff802`2c4ca532 f0410fba6f481f  lock bts dword ptr [r15+48h],1Fh ds:002b:808a818a`808a81d2=????????
Last set context:
rax=0200000000000020 rbx=ffffe0000d36ef48 rcx=0200000000000000
rdx=fffff8022c4ca61a rsi=ffffc00001713e59 rdi=fffffa80052a8020
rip=fffff8022c4ca532 rsp=ffffd000237ad170 rbp=0000000000000000
 r8=00000000001b8d56  r9=02e000000013e59d r10=d5006bd701420000
r11=0000000000000042 r12=0000000000000001 r13=ffffe0000d36e008
r14=ffffe00008aa8b50 r15=808a818a808a818a
iopl=0         nv up ei pl zr na po nc
cs=0010  ss=0018  ds=002b  es=002b  fs=0053  gs=002b             efl=00010246
nt!MiIdentifyPfn+0x322:
fffff802`2c4ca532 f0410fba6f481f  lock bts dword ptr [r15+48h],1Fh ds:002b:808a818a`808a81d2=????????



  • Edited by TacoTruck Thursday, February 26, 2015 3:12 AM
February 26th, 2015 5:57am

This topic is archived. No further replies will be accepted.

Other recent topics Other recent topics