Jump to content


 


Register a free account to unlock additional features at BleepingComputer.com
Welcome to BleepingComputer, a free community where people like yourself come together to discuss and learn how to use their computers. Using the site is easy and fun. As a guest, you can browse and view the various discussions in the forums, but can not create a new topic or reply to an existing one unless you are logged in. Other benefits of registering an account are subscribing to topics and forums, creating a blog, and having no ads shown anywhere on the site.


Click here to Register a free account now! or read our Welcome Guide to learn how to use this site.

Photo

Stop Error on a few new HP Folio 1040 G2's


  • Please log in to reply
2 replies to this topic

#1 CypherBit

CypherBit

  • Members
  • 4 posts
  • OFFLINE
  •  
  • Local time:07:22 AM

Posted 16 April 2015 - 07:02 AM

We recently bought a couple new HP Folio 1040 G2's and we're having very random (multiple weeks can pass without one) BSOD's on all these computers. Memory was extensively tested, BIOS updated, graphics card and other drivers are also slowly being updated. The same Win 8.1 image is used on other machines and there are no issues there. These machines are malware free and have the same set of applications (AV included) as our other notebooks.

 

I even tried with http://answers.microsoft.com/en-us/windows/wiki/windows_other-system/driver-verifier-tracking-down-a-mis-behaving/f5cb4faf-556b-4b6d-95b3-c48669e4c983, for a day or two but I have yet to catch a BSOD when it's running.

 

Here's the error received (it's not always svchost.exe):

Microsoft (R) Windows Debugger Version 6.3.9600.17298 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.



Kernel Bitmap Dump File: Only kernel address space is available


************* Symbol Path validation summary **************
Response                         Time (ms)     Location
Deferred                                       SRV*C:\Symbols*http://msdl.microsoft.com/download/symbols
Symbol search path is: SRV*C:\Symbols*http://msdl.microsoft.com/download/symbols
Executable search path is: 
Windows 8 Kernel Version 9600 MP (4 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS
Built by: 9600.17668.amd64fre.winblue_r8.150127-1500
Machine Name:
Kernel base = 0xfffff802`6088a000 PsLoadedModuleList = 0xfffff802`60b63250
Debug session time: Thu Apr 16 07:57:00.878 2015 (UTC + 2:00)
System Uptime: 0 days 17:33:30.822
Loading Kernel Symbols
...............................................................
................................................................
....................................
Loading User Symbols
PEB is paged out (Peb.Ldr = 00007ff7`ead19018).  Type ".hh dbgerr001" for details
Loading unloaded module list
...................
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

Use !analyze -v to get detailed debugging information.

BugCheck 3B, {c0000005, fffff80260918b83, ffffd000f7547940, 0}

Probably caused by : memory_corruption ( nt!MmPropagateDirtyBitsToPfn+7f )

Followup: MachineOwner
---------

3: kd> !analyze -v
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

SYSTEM_SERVICE_EXCEPTION (3b)
An exception happened while executing a system service routine.
Arguments:
Arg1: 00000000c0000005, Exception code that caused the bugcheck
Arg2: fffff80260918b83, Address of the instruction which caused the bugcheck
Arg3: ffffd000f7547940, Address of the context record for the exception that caused the bugcheck
Arg4: 0000000000000000, zero.

Debugging Details:
------------------


EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - The instruction at 0x%08lx referenced memory at 0x%08lx. The memory could not be %s.

FAULTING_IP: 
nt!MmPropagateDirtyBitsToPfn+7f
fffff802`60918b83 f6c342          test    bl,42h

CONTEXT:  ffffd000f7547940 -- (.cxr 0xffffd000f7547940;r)
rax=0000098000000000 rbx=bbe00001e9e86921 rcx=ffffb001b9080000
rdx=0000007ffffffff8 rsi=ffffe0016d5ab798 rdi=0000000002d00000
rip=fffff80260918b83 rsp=ffffd000f7548370 rbp=ffffe0016d5ab730
 r8=0000000000000030  r9=0000000000000001 r10=0000000000000000
r11=0000000000000200 r12=ffffe0016a3d76d8 r13=0000000000000001
r14=fffff6d800dc8490 r15=fffff6d800dc85f8
iopl=0         nv up ei pl nz na pe nc
cs=0010  ss=0018  ds=002b  es=002b  fs=0053  gs=002b             efl=00010202
nt!MmPropagateDirtyBitsToPfn+0x7f:
fffff802`60918b83 f6c342          test    bl,42h
Last set context:
rax=0000098000000000 rbx=bbe00001e9e86921 rcx=ffffb001b9080000
rdx=0000007ffffffff8 rsi=ffffe0016d5ab798 rdi=0000000002d00000
rip=fffff80260918b83 rsp=ffffd000f7548370 rbp=ffffe0016d5ab730
 r8=0000000000000030  r9=0000000000000001 r10=0000000000000000
r11=0000000000000200 r12=ffffe0016a3d76d8 r13=0000000000000001
r14=fffff6d800dc8490 r15=fffff6d800dc85f8
iopl=0         nv up ei pl nz na pe nc
cs=0010  ss=0018  ds=002b  es=002b  fs=0053  gs=002b             efl=00010202
nt!MmPropagateDirtyBitsToPfn+0x7f:
fffff802`60918b83 f6c342          test    bl,42h
Resetting default scope

DEFAULT_BUCKET_ID:  WIN8_DRIVER_FAULT

BUGCHECK_STR:  0x3B

PROCESS_NAME:  svchost.exe

CURRENT_IRQL:  0

ANALYSIS_VERSION: 6.3.9600.17298 (debuggers(dbg).141024-1500) amd64fre

LAST_CONTROL_TRANSFER:  from fffff8026091656f to fffff80260918b83

STACK_TEXT:  
ffffd000`f7548370 fffff802`6091656f : 00000000`02c00000 ffffe001`6d5ab730 ffffe001`6d5ab798 00000000`02d00000 : nt!MmPropagateDirtyBitsToPfn+0x7f
ffffd000`f75483b0 fffff802`608d9edb : 00000000`00000001 00000000`02500000 ffffe001`6d5ab730 ffffe001`6f3a0ff0 : nt!CcUnmapVacbArray+0x1df
ffffd000`f7548420 fffff802`60c27d33 : 00000000`00000000 00000000`02d1c000 ffffd000`f7548500 ffffd000`f7548560 : nt!CcGetVirtualAddress+0x44b
ffffd000`f75484c0 fffff802`608d8bde : ffffe001`6d5afe00 00000000`02d1c000 00000000`00000100 ffffe001`6d5afe00 : nt!CcMapAndCopyFromCache+0x73
ffffd000`f7548550 fffff800`921a77bf : 00000000`02d1e000 ffffe001`6b218600 ffffe001`00000000 ffffe001`6d5afe00 : nt!CcCopyReadEx+0x106
ffffd000`f75485c0 fffff800`91e99f62 : 00000000`000002a0 00000000`00000001 00000000`746c6644 00000000`00002000 : Ntfs!NtfsCopyReadA+0x1ef
ffffd000`f7548830 fffff800`91e9a7d6 : ffffd000`f7548920 ffffe001`6d5afe00 ffffe001`6af02370 ffffe001`6af02280 : fltmgr!FltpPerformFastIoCall+0xc2
ffffd000`f7548890 fffff800`91ec13af : e0016d5a`fdd0d0bb 00000000`00000a4c ffffd000`f7548a28 00007ffd`9a178368 : fltmgr!FltpPassThroughFastIo+0x165
ffffd000`f75488f0 fffff802`60ca6507 : ffffe001`6d5afe00 ffffe001`6d5afe00 ffffd000`f7548b80 fffff802`60c3a838 : fltmgr!FltpFastIoRead+0x14f
ffffd000`f75489a0 fffff802`609e61b3 : 00000000`746c6644 00000000`00000000 00000000`00000000 00000000`00000000 : nt!NtReadFile+0x3f7
ffffd000`f7548a90 00007ffd`ac120dea : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x13
000000c7`8037eda8 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffd`ac120dea


FOLLOWUP_IP: 
nt!MmPropagateDirtyBitsToPfn+7f
fffff802`60918b83 f6c342          test    bl,42h

SYMBOL_STACK_INDEX:  0

SYMBOL_NAME:  nt!MmPropagateDirtyBitsToPfn+7f

FOLLOWUP_NAME:  MachineOwner

MODULE_NAME: nt

DEBUG_FLR_IMAGE_TIMESTAMP:  54c832b2

STACK_COMMAND:  .cxr 0xffffd000f7547940 ; kb

IMAGE_NAME:  memory_corruption

BUCKET_ID_FUNC_OFFSET:  7f

FAILURE_BUCKET_ID:  0x3B_nt!MmPropagateDirtyBitsToPfn

BUCKET_ID:  0x3B_nt!MmPropagateDirtyBitsToPfn

ANALYSIS_SOURCE:  KM

FAILURE_ID_HASH_STRING:  km:0x3b_nt!mmpropagatedirtybitstopfn

FAILURE_ID_HASH:  {443a8c35-cc56-0a74-b342-ae261ee83227}

Followup: MachineOwner
---------


Any assistance would be appreciated.


Edited by computerxpds, 23 April 2015 - 07:33 PM.
Edited out line as requested by user


BC AdBot (Login to Remove)

 


#2 jcgriff2

jcgriff2

  • BSOD Kernel Dump Expert
  • 1,109 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:New Jersey Shore
  • Local time:02:22 AM

Posted 16 April 2015 - 01:49 PM

I see fltmgr.sys and ntfs.sys + "pfn" (Page Frame Number - page file) in the stack text, which may indicate some type of issue with the hard drive.

 

However, you are telling us that BSODs are occurring on multiple systems, so HDD problems seem unlikely since multiple systems are involved.

 

If 3rd party software related, Driver Verifier may help.  Run it and see if any 3rd party drivers are flagged -

 

http://www.sysnative.com/forums/bsod-crashes-kernel-debugging/29-driver-verifier-bsod-related-windows-10-8-1-8-7-vista.html#post87

 

Regards. . .

 

jcgriff2


Microsoft MVP 2009-2015
Microsoft Windows Insider MVP 2018 - Present

#3 CypherBit

CypherBit
  • Topic Starter

  • Members
  • 4 posts
  • OFFLINE
  •  
  • Local time:07:22 AM

Posted 23 April 2015 - 12:29 AM

jcgriff2, thank you for your reply. We've been running Driver Verifier on a couple of machines for the last few days and we finally had another BSOD.

 

Here's the error, please let me know if additional data, information is required:


************* Symbol Path validation summary **************
Response                         Time (ms)     Location
Deferred                                       SRV*C:\Symbols*http://msdl.microsoft.com/download/symbols
Symbol search path is: SRV*C:\Symbols*http://msdl.microsoft.com/download/symbols
Executable search path is: 
Windows 8 Kernel Version 9600 MP (4 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS
Built by: 9600.17668.amd64fre.winblue_r8.150127-1500
Machine Name:
Kernel base = 0xfffff800`70a1b000 PsLoadedModuleList = 0xfffff800`70cf4250
Debug session time: Wed Apr 22 10:28:39.541 2015 (UTC + 2:00)
System Uptime: 0 days 2:11:32.636
Loading Kernel Symbols
...............................................................
................................................................
...............................
Loading User Symbols
PEB is paged out (Peb.Ldr = 00007ff6`7f4fb018).  Type ".hh dbgerr001" for details
Loading unloaded module list
..................................
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

Use !analyze -v to get detailed debugging information.

BugCheck 3B, {c0000005, fffff80070aa9b83, ffffd0003c48a940, 0}

Probably caused by : memory_corruption ( nt!MmPropagateDirtyBitsToPfn+7f )

Followup: MachineOwner
---------

2: kd> !analyze -v
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

SYSTEM_SERVICE_EXCEPTION (3b)
An exception happened while executing a system service routine.
Arguments:
Arg1: 00000000c0000005, Exception code that caused the bugcheck
Arg2: fffff80070aa9b83, Address of the instruction which caused the bugcheck
Arg3: ffffd0003c48a940, Address of the context record for the exception that caused the bugcheck
Arg4: 0000000000000000, zero.

Debugging Details:
------------------


EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - The instruction at 0x%08lx referenced memory at 0x%08lx. The memory could not be %s.

FAULTING_IP: 
nt!MmPropagateDirtyBitsToPfn+7f
fffff800`70aa9b83 f6c342          test    bl,42h

CONTEXT:  ffffd0003c48a940 -- (.cxr 0xffffd0003c48a940;r)
rax=0000098000000000 rbx=95f0000071198921 rcx=ffffb00073540000
rdx=0000007ffffffff8 rsi=ffffe00126db7078 rdi=0000000003200000
rip=fffff80070aa9b83 rsp=ffffd0003c48b370 rbp=ffffe00126db7010
 r8=0000000000000034  r9=0000000000000001 r10=0000000000000000
r11=0000000000000200 r12=ffffe00123178d78 r13=0000000000000001
r14=fffff6d80039aa80 r15=fffff6d80039abf8
iopl=0         nv up ei pl nz na pe nc
cs=0010  ss=0018  ds=002b  es=002b  fs=0053  gs=002b             efl=00010202
nt!MmPropagateDirtyBitsToPfn+0x7f:
fffff800`70aa9b83 f6c342          test    bl,42h
Last set context:
rax=0000098000000000 rbx=95f0000071198921 rcx=ffffb00073540000
rdx=0000007ffffffff8 rsi=ffffe00126db7078 rdi=0000000003200000
rip=fffff80070aa9b83 rsp=ffffd0003c48b370 rbp=ffffe00126db7010
 r8=0000000000000034  r9=0000000000000001 r10=0000000000000000
r11=0000000000000200 r12=ffffe00123178d78 r13=0000000000000001
r14=fffff6d80039aa80 r15=fffff6d80039abf8
iopl=0         nv up ei pl nz na pe nc
cs=0010  ss=0018  ds=002b  es=002b  fs=0053  gs=002b             efl=00010202
nt!MmPropagateDirtyBitsToPfn+0x7f:
fffff800`70aa9b83 f6c342          test    bl,42h
Resetting default scope

DEFAULT_BUCKET_ID:  WIN8_DRIVER_FAULT

BUGCHECK_STR:  0x3B

PROCESS_NAME:  svchost.exe

CURRENT_IRQL:  0

ANALYSIS_VERSION: 6.3.9600.17298 (debuggers(dbg).141024-1500) amd64fre

LAST_CONTROL_TRANSFER:  from fffff80070aa756f to fffff80070aa9b83

STACK_TEXT:  
ffffd000`3c48b370 fffff800`70aa756f : 00000000`02d00000 ffffe001`26db7010 ffffe001`26db7078 00000000`03200000 : nt!MmPropagateDirtyBitsToPfn+0x7f
ffffd000`3c48b3b0 fffff800`70a6aedb : 00000000`03200001 00000000`02a00000 ffffe001`26db7010 ffffe001`2317b988 : nt!CcUnmapVacbArray+0x1df
ffffd000`3c48b420 fffff800`70db8d33 : 00000000`00000000 00000000`03208000 ffffd000`3c48b500 ffffd000`3c48b560 : nt!CcGetVirtualAddress+0x44b
ffffd000`3c48b4c0 fffff800`70a69bde : ffffe001`26d89670 00000000`03208000 fffffa80`00000100 ffffe001`26d89670 : nt!CcMapAndCopyFromCache+0x73
ffffd000`3c48b550 fffff801`3d2ef7bf : 00000000`0320a000 ffffe001`24ec0920 ffffe001`00000000 ffffe001`26d89670 : nt!CcCopyReadEx+0x106
ffffd000`3c48b5c0 fffff801`3ce1ef62 : 00000000`000002a0 fffff800`70d76e01 ffffd000`746c6644 00000000`00002000 : Ntfs!NtfsCopyReadA+0x1ef
ffffd000`3c48b830 fffff801`3ce1f7d6 : ffffd000`3c48b920 ffffe001`26d89600 ffffe001`2695c8f0 ffffe001`2695c800 : fltmgr!FltpPerformFastIoCall+0xc2
ffffd000`3c48b890 fffff801`3ce463af : e00126d8`9640fdb5 00000000`00000960 ffffd000`3c48ba28 00007ff8`36598368 : fltmgr!FltpPassThroughFastIo+0x165
ffffd000`3c48b8f0 fffff800`70e37507 : ffffe001`26d89670 ffffe001`26d89670 00007ff8`36599268 fffff800`70dcb838 : fltmgr!FltpFastIoRead+0x14f
ffffd000`3c48b9a0 fffff800`70b771b3 : 00000000`746c6644 00000000`00000000 00000000`00000000 00000000`00000000 : nt!NtReadFile+0x3f7
ffffd000`3c48ba90 00007ff8`483d0dea : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x13
0000001a`4ad8ef98 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ff8`483d0dea


FOLLOWUP_IP: 
nt!MmPropagateDirtyBitsToPfn+7f
fffff800`70aa9b83 f6c342          test    bl,42h

SYMBOL_STACK_INDEX:  0

SYMBOL_NAME:  nt!MmPropagateDirtyBitsToPfn+7f

FOLLOWUP_NAME:  MachineOwner

MODULE_NAME: nt

DEBUG_FLR_IMAGE_TIMESTAMP:  54c832b2

STACK_COMMAND:  .cxr 0xffffd0003c48a940 ; kb

IMAGE_NAME:  memory_corruption

BUCKET_ID_FUNC_OFFSET:  7f

FAILURE_BUCKET_ID:  0x3B_VRF_nt!MmPropagateDirtyBitsToPfn

BUCKET_ID:  0x3B_VRF_nt!MmPropagateDirtyBitsToPfn

ANALYSIS_SOURCE:  KM

FAILURE_ID_HASH_STRING:  km:0x3b_vrf_nt!mmpropagatedirtybitstopfn

FAILURE_ID_HASH:  {b5fee692-b421-5f0e-3c27-bb66d14a6644}

Followup: MachineOwner
---------







0 user(s) are reading this topic

0 members, 0 guests, 0 anonymous users