*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
Use !analyze -v to get detailed debugging information.
BugCheck 139, {3, ffffd00104d6a6e0, ffffd00104d6a638, 0}
*** WARNING: Unable to verify timestamp for bwcW8x64.sys
*** ERROR: Module load completed but symbols could not be loaded for bwcW8x64.sys
Probably caused by : bwcW8x64.sys ( bwcW8x64+4fda )
Followup: MachineOwner
Microsoft (R) Windows Debugger Version 10.0.10586.567 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [C:\Users\PC\Downloads\080616-5140-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
Symbol search path is: srv*
Executable search path is:
Windows 8.1 Kernel Version 9600 MP (8 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS Personal
Built by: 9600.18378.amd64fre.winblue_ltsb.160611-0600
Machine Name:
Kernel base = 0xfffff802`70a0e000 PsLoadedModuleList = 0xfffff802`70ce1630
Debug session time: Sat Aug 6 23:05:08.885 2016 (UTC - 4:00)
System Uptime: 0 days 7:04:40.224
Loading Kernel Symbols
...............................................................
................................................................
...............
Loading User Symbols
Loading unloaded module list
.................
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
Use !analyze -v to get detailed debugging information.
BugCheck 139, {3, ffffd001d921f3e0, ffffd001d921f338, 0}
Probably caused by : dxgmms1.sys ( dxgmms1!VIDMM_GLOBAL::CloseOneAllocation+1a895 )
Followup: MachineOwner
---------
2: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
KERNEL_SECURITY_CHECK_FAILURE (139)
A kernel component has corrupted a critical data structure. The corruption
could potentially allow a malicious user to gain control of this machine.
Arguments:
Arg1: 0000000000000003, A LIST_ENTRY has been corrupted (i.e. double remove).
Arg2: ffffd001d921f3e0, Address of the trap frame for the exception that caused the bugcheck
Arg3: ffffd001d921f338, Address of the exception record for the exception that caused the bugcheck
Arg4: 0000000000000000, Reserved
Debugging Details:
------------------
DUMP_CLASS: 1
DUMP_QUALIFIER: 400
BUILD_VERSION_STRING: 9600.18378.amd64fre.winblue_ltsb.160611-0600
SYSTEM_MANUFACTURER: MSI
SYSTEM_PRODUCT_NAME: MS-7978
SYSTEM_SKU: Default string
SYSTEM_VERSION: 2.0
BIOS_VENDOR: American Megatrends Inc.
BIOS_VERSION: A.60
BIOS_DATE: 05/16/2016
BASEBOARD_MANUFACTURER: MSI
BASEBOARD_PRODUCT: Z170A GAMING M3 (MS-7978)
BASEBOARD_VERSION: 2.0
DUMP_TYPE: 2
BUGCHECK_P1: 3
BUGCHECK_P2: ffffd001d921f3e0
BUGCHECK_P3: ffffd001d921f338
BUGCHECK_P4: 0
TRAP_FRAME: ffffd001d921f3e0 -- (.trap 0xffffd001d921f3e0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=ffffe001c2a0a2f0 rbx=0000000000000000 rcx=0000000000000003
rdx=ffffc000bd2e3878 rsi=0000000000000000 rdi=0000000000000000
rip=fffff8003e5db515 rsp=ffffd001d921f570 rbp=0000000000000000
r8=000000000000000b r9=000000000000000b r10=fffff78000000008
r11=7ffffffffffffffc r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei ng nz na po cy
dxgmms1!VIDMM_GLOBAL::CloseOneAllocation+0x1a895:
fffff800`3e5db515 cd29 int 29h
Resetting default scope
EXCEPTION_RECORD: ffffd001d921f338 -- (.exr 0xffffd001d921f338)
ExceptionAddress: fffff8003e5db515 (dxgmms1!VIDMM_GLOBAL::CloseOneAllocation+0x000000000001a895)
ExceptionCode: c0000409 (Security check failure or stack buffer overrun)
ExceptionFlags: 00000001
NumberParameters: 1
Parameter[0]: 0000000000000003
Subcode: 0x3 FAST_FAIL_CORRUPT_LIST_ENTRY
CPU_COUNT: 8
CPU_MHZ: fa8
CPU_VENDOR: GenuineIntel
CPU_FAMILY: 6
CPU_MODEL: 5e
CPU_STEPPING: 3
CPU_MICROCODE: 6,5e,3,0 (F,M,S,R) SIG: 84'00000000 (cache) 84'00000000 (init)
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: LIST_ENTRY_CORRUPT
BUGCHECK_STR: 0x139
PROCESS_NAME: Overwatch.exe
CURRENT_IRQL: 0
ERROR_CODE: (NTSTATUS) 0xc0000409 - The system detected an overrun of a stack-based buffer in this application. This overrun could potentially allow a malicious user to gain control of this application.
EXCEPTION_CODE: (NTSTATUS) 0xc0000409 - The system detected an overrun of a stack-based buffer in this application. This overrun could potentially allow a malicious user to gain control of this application.
EXCEPTION_CODE_STR: c0000409
EXCEPTION_PARAMETER1: 0000000000000003
ANALYSIS_SESSION_HOST: COREREACTOR
ANALYSIS_SESSION_TIME: 08-06-2016 23:17:13.0616
ANALYSIS_VERSION: 10.0.10586.567 amd64fre
LAST_CONTROL_TRANSFER: from fffff80270b67de9 to fffff80270b5c2a0
STACK_TEXT:
ffffd001`d921f0b8 fffff802`70b67de9 : 00000000`00000139 00000000`00000003 ffffd001`d921f3e0 ffffd001`d921f338 : nt!KeBugCheckEx
ffffd001`d921f0c0 fffff802`70b68110 : ffffd001`d921f3e0 ffffd001`d921f289 00000000`00000000 00000000`00000000 : nt!KiBugCheckDispatch+0x69
ffffd001`d921f200 fffff802`70b67334 : 00000000`00000002 00000000`00000000 00000000`00000000 00000000`00000001 : nt!KiFastFailDispatch+0xd0
ffffd001`d921f3e0 fffff800`3e5db515 : ffffe001`c2a0a320 fffff800`00000000 ffffe001`bbfd7000 ffffe001`c2910000 : nt!KiRaiseSecurityCheckFailure+0xf4
ffffd001`d921f570 fffff800`3e5c0c32 : ffffc000`be2e93e0 fffff800`00000000 ffffe001`00000000 00000000`00000000 : dxgmms1!VIDMM_GLOBAL::CloseOneAllocation+0x1a895
ffffd001`d921f6f0 fffff800`3e4630f2 : ffffc000`be0a98d0 ffffd001`d921f8c0 ffffc000`be3448b0 00000000`00000002 : dxgmms1!VIDMM_GLOBAL::CloseAllocation+0x52
ffffd001`d921f730 fffff800`3e45d452 : ffffc000`be2e93e0 00000000`00000000 ffffc000`00000000 ffffc000`be0a98d0 : dxgkrnl!DXGDEVICE:estroyAllocations+0x172
ffffd001`d921f830 fffff802`70b67ab3 : ffffe001`c1a98880 00000000`00000000 ffffe001`bcbbf401 00000078`00000000 : dxgkrnl!DxgkPresent+0x682
ffffd001`d921fa00 00007ffe`300d173a : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x13
00000078`1e24e3b8 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffe`300d173a
STACK_COMMAND: kb
THREAD_SHA1_HASH_MOD_FUNC: 3988fb283b99614e9758437a32f5e2c62bada263
THREAD_SHA1_HASH_MOD_FUNC_OFFSET: 02b50e937fa59ec0298772d9017dcd03ef496666
THREAD_SHA1_HASH_MOD: 05c6c0f2a208b89951c23c5d66f594e30627c075
FOLLOWUP_IP:
dxgmms1!VIDMM_GLOBAL::CloseOneAllocation+1a895
fffff800`3e5db515 cd29 int 29h
FAULT_INSTR_CODE: 44cc29cd
SYMBOL_STACK_INDEX: 4
SYMBOL_NAME: dxgmms1!VIDMM_GLOBAL::CloseOneAllocation+1a895
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: dxgmms1
IMAGE_NAME: dxgmms1.sys
DEBUG_FLR_IMAGE_TIMESTAMP: 54505506
IMAGE_VERSION: 6.3.9600.17415
BUCKET_ID_FUNC_OFFSET: 1a895
FAILURE_BUCKET_ID: 0x139_3_dxgmms1!VIDMM_GLOBAL::CloseOneAllocation
BUCKET_ID: 0x139_3_dxgmms1!VIDMM_GLOBAL::CloseOneAllocation
PRIMARY_PROBLEM_CLASS: 0x139_3_dxgmms1!VIDMM_GLOBAL::CloseOneAllocation
TARGET_TIME: 2016-08-07T03:05:08.000Z
OSBUILD: 9600
OSSERVICEPACK: 0
SERVICEPACK_NUMBER: 0
OS_REVISION: 0
SUITE_MASK: 784
PRODUCT_TYPE: 1
OSPLATFORM_TYPE: x64
OSNAME: Windows 8.1
OSEDITION: Windows 8.1 WinNt TerminalServer SingleUserTS Personal
OS_LOCALE:
USER_LCID: 0
OSBUILD_TIMESTAMP: 2016-06-11 11:45:59
BUILDDATESTAMP_STR: 160611-0600
BUILDLAB_STR: winblue_ltsb
BUILDOSVER_STR: 6.3.9600.18378.amd64fre.winblue_ltsb.160611-0600
ANALYSIS_SESSION_ELAPSED_TIME: 2b6
ANALYSIS_SOURCE: KM
FAILURE_ID_HASH_STRING: km:0x139_3_dxgmms1!vidmm_global::closeoneallocation
FAILURE_ID_HASH: {b88b4adf-cd8b-03a6-aa30-49ad86850731}
Windows Resource Protection found corrupt files but was unable to fix some of them. Details are included in the CBS.Log
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
Use !analyze -v to get detailed debugging information.
BugCheck 139, {3, ffffd001d921f3e0, ffffd001d921f338, 0}
Probably caused by : dxgmms1.sys ( dxgmms1!VIDMM_GLOBAL::CloseOneAllocation+1a895 )
Followup: MachineOwner
Thank you, I also assume he did a clean install onto a clean HDD?He did use a disk for windows 8.1.
The restore operation completed successfully. The component store corruption was repaired.
The operation completed successfully.
Windows Resource Protection found corrupt files and successfully repaired them. Details are included in the CBS.log ...
Microsoft (R) Windows Debugger Version 10.0.10586.567 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [C:\Users\PC\Downloads\080816-5093-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
Symbol search path is: srv*
Executable search path is:
Windows 8.1 Kernel Version 9600 MP (8 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS Personal
Built by: 9600.18378.amd64fre.winblue_ltsb.160611-0600
Machine Name:
Kernel base = 0xfffff803`6988e000 PsLoadedModuleList = 0xfffff803`69b61630
Debug session time: Mon Aug 8 18:10:08.092 2016 (UTC - 4:00)
System Uptime: 0 days 23:11:28.757
Loading Kernel Symbols
...............................................................
................................................................
.....................
Loading User Symbols
Loading unloaded module list
...........
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
Use !analyze -v to get detailed debugging information.
BugCheck 50, {ffffc000e28e7d80, 0, fffff8036996836f, 2}
Could not read faulting driver name
Probably caused by : ntkrnlmp.exe ( nt!RtlDeleteNoSplay+5f )
Followup: MachineOwner
---------
0: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
PAGE_FAULT_IN_NONPAGED_AREA (50)
Invalid system memory was referenced. This cannot be protected by try-except.
Typically the address is just plain bad or it is pointing at freed memory.
Arguments:
Arg1: ffffc000e28e7d80, memory referenced.
Arg2: 0000000000000000, value 0 = read operation, 1 = write operation.
Arg3: fffff8036996836f, If non-zero, the instruction address which referenced the bad memory
address.
Arg4: 0000000000000002, (reserved)
Debugging Details:
------------------
Could not read faulting driver name
DUMP_CLASS: 1
DUMP_QUALIFIER: 400
BUILD_VERSION_STRING: 9600.18378.amd64fre.winblue_ltsb.160611-0600
SYSTEM_MANUFACTURER: MSI
SYSTEM_PRODUCT_NAME: MS-7978
SYSTEM_SKU: Default string
SYSTEM_VERSION: 2.0
BIOS_VENDOR: American Megatrends Inc.
BIOS_VERSION: A.60
BIOS_DATE: 05/16/2016
BASEBOARD_MANUFACTURER: MSI
BASEBOARD_PRODUCT: Z170A GAMING M3 (MS-7978)
BASEBOARD_VERSION: 2.0
DUMP_TYPE: 2
BUGCHECK_P1: ffffc000e28e7d80
BUGCHECK_P2: 0
BUGCHECK_P3: fffff8036996836f
BUGCHECK_P4: 2
READ_ADDRESS: GetPointerFromAddress: unable to read from fffff80369bea138
Unable to get MmSystemRangeStart
ffffc000e28e7d80
FAULTING_IP:
nt!RtlDeleteNoSplay+5f
fffff803`6996836f 48391a cmp qword ptr [rdx],rbx
MM_INTERNAL_CODE: 2
CPU_COUNT: 8
CPU_MHZ: fa8
CPU_VENDOR: GenuineIntel
CPU_FAMILY: 6
CPU_MODEL: 5e
CPU_STEPPING: 3
CPU_MICROCODE: 6,5e,3,0 (F,M,S,R) SIG: 84'00000000 (cache) 84'00000000 (init)
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: WIN8_DRIVER_FAULT
BUGCHECK_STR: AV
PROCESS_NAME: System
CURRENT_IRQL: 0
ANALYSIS_SESSION_HOST: COREREACTOR
ANALYSIS_SESSION_TIME: 08-08-2016 18:29:48.0536
ANALYSIS_VERSION: 10.0.10586.567 amd64fre
TRAP_FRAME: ffffd001eea80290 -- (.trap 0xffffd001eea80290)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=ffffc000e28e7d78 rbx=0000000000000000 rcx=ffffc000e38e7d78
rdx=ffffc000e28e7d80 rsi=0000000000000000 rdi=0000000000000000
rip=fffff8036996836f rsp=ffffd001eea80420 rbp=ffffffffffffffff
r8=ffffffffffffffff r9=ffffffffffffffff r10=ffffe0008f377ae0
r11=7ffffffffffffffc r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei ng nz na po cy
nt!RtlDeleteNoSplay+0x5f:
fffff803`6996836f 48391a cmp qword ptr [rdx],rbx ds:ffffc000`e28e7d80=????????????????
Resetting default scope
LAST_CONTROL_TRANSFER: from fffff80369a134c1 to fffff803699dc2a0
STACK_TEXT:
ffffd001`eea80028 fffff803`69a134c1 : 00000000`00000050 ffffc000`e28e7d80 00000000`00000000 ffffd001`eea80290 : nt!KeBugCheckEx
ffffd001`eea80030 fffff803`698f9e39 : 00000000`00000000 ffffe000`869718c0 ffffd001`eea80290 00000000`00000000 : nt! ?? ::FNODOBFM::`string'+0x26d01
ffffd001`eea800d0 fffff803`699e652f : 00000000`00000000 ffffc000`e38e7d78 ffffc000`e38e7d00 fffff803`699dd8b3 : nt!MmAccessFault+0x769
ffffd001`eea80290 fffff803`6996836f : 00000000`00000010 00000000`00000286 ffffd001`eea80448 00000000`00000018 : nt!KiPageFault+0x12f
ffffd001`eea80420 fffff800`21c0596a : ffffc000`e38e7d78 00000000`00000002 ffffc000`e38e7e30 00000000`00000102 : nt!RtlDeleteNoSplay+0x5f
ffffd001`eea80450 fffff800`21c2c70a : ffffffff`ffffffff ffffe000`8f377ae0 00000000`00000000 ffffc000`e38e6c70 : fltmgr!TreeUnlinkMulti+0x13d
ffffd001`eea804a0 fffff800`21c2c991 : ffffe000`8b568010 00000000`00000705 ffffffff`ffffffff ffffe000`8f377b38 : fltmgr!DeleteNameCacheNodes+0x7a
ffffd001`eea80500 fffff800`21c2dbc0 : ffffe000`8f377b28 00000000`00000705 ffffffff`ffffffff ffffe000`8b568010 : fltmgr!FltpFreeNameCacheList+0x21
ffffd001`eea80540 fffff800`21c2db26 : ffffe000`8f377ae0 00000000`00000705 00000000`00000702 00000000`00000705 : fltmgr!CleanupStreamListCtrl+0x78
ffffd001`eea80580 fffff803`69cfb9bf : 00000000`00000000 00000000`00000745 ffffc000`e38e8500 00000000`00000700 : fltmgr!DeleteStreamListCtrlCallback+0x92
ffffd001`eea805c0 fffff800`224ed8c9 : ffffc000`e38e7480 ffffe000`8f377ae8 ffffe000`8691f180 00000000`00000706 : nt!FsRtlTeardownPerStreamContexts+0x53
ffffd001`eea80630 fffff800`224e2c39 : 00000000`01010705 ffffe000`87928d00 00000000`00000000 ffffe000`8691f180 : Ntfs!NtfsDeleteScb+0x399
ffffd001`eea806e0 fffff800`2243d7d4 : ffffe000`8699ed40 ffffc000`e38e7480 ffffe000`87928e68 ffffc000`e38e7380 : Ntfs!NtfsRemoveScb+0x99
ffffd001`eea80720 fffff800`224e6170 : ffffc000`e38e7350 ffffd001`eea80940 ffffc000`e38e7350 ffffd001`eea80800 : Ntfs!NtfsPrepareFcbForRemoval+0x54
ffffd001`eea80750 fffff800`22444a20 : ffffe000`929b8cd8 ffffc000`e38e7350 ffffc000`e38e7720 ffffc000`e38e7350 : Ntfs!NtfsTeardownStructures+0x90
ffffd001`eea807d0 fffff800`22508334 : ffffd001`eea80978 ffffd001`eea80940 ffffc000`e38e7350 ffffc000`e38e7350 : Ntfs!NtfsDecrementCloseCounts+0xd4
ffffd001`eea80810 fffff800`224ee421 : ffffe000`929b8cd8 ffffc000`e38e7480 ffffc000`e38e7350 ffffe000`8691f180 : Ntfs!NtfsCommonClose+0x3a4
ffffd001`eea808e0 fffff803`69942a2f : 00000000`00000000 fffff800`224ee580 fffff800`2248dce8 00000000`00000001 : Ntfs!NtfsFspCloseInternal+0x1a1
ffffd001`eea80a50 fffff803`69988c10 : ffff8a5a`f67637c4 ffffe000`8d907040 00000000`00000080 ffffe000`8d907040 : nt!ExpWorkerThread+0x69f
ffffd001`eea80b00 fffff803`699e28c6 : ffffd001`edb40180 ffffe000`8d907040 ffffe000`8f3cb880 ffffd001`eea80c90 : nt!PspSystemThreadStartup+0x58
ffffd001`eea80b60 00000000`00000000 : ffffd001`eea81000 ffffd001`eea7a000 00000000`00000000 00000000`00000000 : nt!KiStartSystemThread+0x16
STACK_COMMAND: kb
THREAD_SHA1_HASH_MOD_FUNC: cc862d9584ae8e39ec506ab161ed99b7f2f67970
THREAD_SHA1_HASH_MOD_FUNC_OFFSET: 57ad1721ad3f0a8141c58027c465d1019e274e80
THREAD_SHA1_HASH_MOD: 4e5738950cb3f83f15d9e588765af7d201d63f74
FOLLOWUP_IP:
nt!RtlDeleteNoSplay+5f
fffff803`6996836f 48391a cmp qword ptr [rdx],rbx
FAULT_INSTR_CODE: 751a3948
SYMBOL_STACK_INDEX: 4
SYMBOL_NAME: nt!RtlDeleteNoSplay+5f
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: nt
IMAGE_NAME: ntkrnlmp.exe
DEBUG_FLR_IMAGE_TIMESTAMP: 575c3237
IMAGE_VERSION: 6.3.9600.18378
BUCKET_ID_FUNC_OFFSET: 5f
FAILURE_BUCKET_ID: AV_nt!RtlDeleteNoSplay
BUCKET_ID: AV_nt!RtlDeleteNoSplay
PRIMARY_PROBLEM_CLASS: AV_nt!RtlDeleteNoSplay
TARGET_TIME: 2016-08-08T22:10:08.000Z
OSBUILD: 9600
OSSERVICEPACK: 0
SERVICEPACK_NUMBER: 0
OS_REVISION: 0
SUITE_MASK: 784
PRODUCT_TYPE: 1
OSPLATFORM_TYPE: x64
OSNAME: Windows 8.1
OSEDITION: Windows 8.1 WinNt TerminalServer SingleUserTS Personal
OS_LOCALE:
USER_LCID: 0
OSBUILD_TIMESTAMP: 2016-06-11 11:45:59
BUILDDATESTAMP_STR: 160611-0600
BUILDLAB_STR: winblue_ltsb
BUILDOSVER_STR: 6.3.9600.18378.amd64fre.winblue_ltsb.160611-0600
ANALYSIS_SESSION_ELAPSED_TIME: 32a
ANALYSIS_SOURCE: KM
FAILURE_ID_HASH_STRING: km:av_nt!rtldeletenosplay
FAILURE_ID_HASH: {bebce8cf-2824-8195-e433-1ad6c75dc3f0}
Followup: MachineOwner
---------
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
Use !analyze -v to get detailed debugging information.
BugCheck 50, {ffffc000e28e7d80, 0, fffff8036996836f, 2}
Could not read faulting driver name
Probably caused by : ntkrnlmp.exe ( nt!RtlDeleteNoSplay+5f )
Followup: MachineOwner
Hi,
as this bsod keeps recurring you'll have to basically test everything although after rereading the thread I notice no memtest6 scan was ever run after it was suggested at the beginning'
Okay, update here.
Memtest 86 ran over the weekend, we got 13 passses with no errors but a warning that the RAM may be vulnerable to high frequency row hammer bit flips.
Stress test the gpu using furmark:
FurMark: VGA Stress Test, Graphics Card and GPU Stability Test, Burn-in Test, OpenGL Benchmark and GPU Temperature | oZone3D.Net
Monitor system temperatures and run for around an hour unless it bsod's of course.
As a SSD is being used is it fully updating firmware wise and is the controllers set to AHCI?
It's entirely up to you but it may help.I suppose we can try running it for an hour in his computer. If it fails or BSODs maybe we'll get some more hints.
Ok welI I hope that the coming week goes well and if any bsod's occur please post the dump files and we'll take a look..Update: Furmark ran fine for an hour without any changes. It was running just as smoothly at the end as it did in the beginning. No more BSODs since the last DMP I posted. Occasionally some games will run fine for a few hours but then they abruptly start crashing to desktop with no logs. A quick restart of windows remedies this.
We'll see what the rest of the week holds.
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
Use !analyze -v to get detailed debugging information.
BugCheck 50, {fffff6c80010ee58, 0, fffff8009e3298da, 2}
Could not read faulting driver name
Probably caused by : memory_corruption ( nt!MmDeleteKernelStack+5a )
Followup: MachineOwner
Memtest 86 ran over the weekend, we got 13 passses with no errors but a warning that the RAM may be vulnerable to high frequency rowhammer bit flips.
PassMark MemTest86 - Memory Diagnostic Tool - Troublingshooting Memory ErrorsThere are several actions that can be taken when you discover that your RAM modules are vulnerable to disturbance errors:
Depending on your willingness to live with the possibility of these errors manifesting itself as real problems, you may choose to do nothing and accept the risk. For home use you may be willing to live with the errors. In our experience, we have several machines that have been stable for home/office use despite experiencing errors in the Hammer Test.
- Do nothing
- Replace the RAM modules
- Use RAM modules with error-checking capabilities (eg. ECC)
You may also choose to replace the RAM with modules that have been known to pass the Hammer Test. Choose RAM modules of different brand/model as it is likely that the RAM modules with the same model would still fail the Hammer test.