needing help with BSOD

Page 2 - Seeking answers? Join the Tom's Hardware community: where nearly two million members share solutions and discuss the latest tech.

kylen1234567777

Prominent
Aug 16, 2017
21
0
510
Hello, so ive been having BSOD for a while since i upgraded my pc from win 7 to 10, after this i formatted the drive and reinstalled a clean version of win 10 and all the drivers, still having BSOD so i reinstalled win 10 again, still having issues.
From that i started trying to roll back drivers, after roll back of chipset drivers i had no BSOD for 14 days, but now its back again, without any further updates. I have had many errors with different reasons, but currently i am receiving this minidump
(through WhoCrashed)

On Thu 17/08/2017 12:22:10 PM your computer crashed
crash dump file: C:\Windows\Minidump\081717-6312-01.dmp
This was probably caused by the following module: nvlddmkm.sys (0xFFFFF80D3D569D0E)
Bugcheck code: 0x7F (0x8, 0xFFFFF8004146BE70, 0x0, 0xFFFFF80D3D569D0E)
Error: UNEXPECTED_KERNEL_MODE_TRAP
file path: C:\Windows\System32\DriverStore\FileRepository\nv_dispi.inf_amd64_9ab613610b40aa98\nvlddmkm.sys
product: NVIDIA Windows Kernel Mode Driver, Version 385.28
company: NVIDIA Corporation
description: NVIDIA Windows Kernel Mode Driver, Version 385.28
Bug check description: This bug check indicates that the Intel CPU generated a trap and the kernel failed to catch this trap.
A third party driver was identified as the probable root cause of this system error. It is suggested you look for an update for the following driver: nvlddmkm.sys (NVIDIA Windows Kernel Mode Driver, Version 385.28 , NVIDIA Corporation).
Google query: NVIDIA Corporation UNEXPECTED_KERNEL_MODE_TRAP



System specs
Computer name: DESKTOP-QOG6GDH
Windows version: Windows 10 , 10.0, build: 15063
Windows dir: C:\Windows
Hardware: MS-7A38, Micro-Star International Co., Ltd, B350M BAZOOKA (MS-7A38)
CPU: AuthenticAMD AMD Ryzen 7 1700 Eight-Core Processor AMD586, level: 23
16 logical processors, active mask: 65535
RAM: 34309632000 bytes total
GPU: MSI Geforce GTX 1050Ti Gaming X

I am a massive noob so any instructions would be good in basic form,
Thanks in advance :)
 

kylen1234567777

Prominent
Aug 16, 2017
21
0
510
i had removed live update, as well as changed the sata cables and ports used on my SSD and still had a crash. It did not save a full dump as it was set to do for some unknown reason. I will post a link to the next dump when it occurs.
Thanks
 

kylen1234567777

Prominent
Aug 16, 2017
21
0
510
it had a dump again today and i recorded a complete dump, here are its details.
Not sure what it means, but hopefully one of you could explain.
thanks

Microsoft (R) Windows Debugger Version 10.0.15063.468 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.


Loading Dump File [C:\Memory.dmp]
Kernel Bitmap Dump File: Full address space is available


************* Symbol Path validation summary **************
Response Time (ms) Location
Deferred srv*C:\symbols*http://msdl.microsoft.com/download/symbols
Symbol search path is: srv*C:\symbols*http://msdl.microsoft.com/download/symbols
Executable search path is:
Windows 10 Kernel Version 16299 MP (16 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS
Built by: 16299.15.amd64fre.rs3_release.170928-1534
Machine Name:
Kernel base = 0xfffff802`8fe84000 PsLoadedModuleList = 0xfffff802`901e5fd0
Debug session time: Tue Nov 7 19:58:51.457 2017 (UTC + 11:00)
System Uptime: 0 days 22:06:47.160
Loading Kernel Symbols
...............................................................
................................................................
...........................................................
Loading User Symbols
.....................
Loading unloaded module list
..............
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************

Use !analyze -v to get detailed debugging information.

BugCheck 3B, {c0000005, fffff80290368f7f, fffff905f33553e0, 0}

Probably caused by : ntkrnlmp.exe ( nt!CmpGetNameControlBlock+12f )

Followup: MachineOwner
---------

2: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************

SYSTEM_SERVICE_EXCEPTION (3b)
An exception happened while executing a system service routine.
Arguments:
Arg1: 00000000c0000005, Exception code that caused the bugcheck
Arg2: fffff80290368f7f, Address of the instruction which caused the bugcheck
Arg3: fffff905f33553e0, Address of the context record for the exception that caused the bugcheck
Arg4: 0000000000000000, zero.

Debugging Details:
------------------


DUMP_CLASS: 1

DUMP_QUALIFIER: 402

BUILD_VERSION_STRING: 16299.15.amd64fre.rs3_release.170928-1534

SYSTEM_MANUFACTURER: Micro-Star International Co., Ltd

SYSTEM_PRODUCT_NAME: MS-7A38

SYSTEM_SKU: To be filled by O.E.M.

SYSTEM_VERSION: 1.0

BIOS_VENDOR: American Megatrends Inc.

BIOS_VERSION: 1.50

BIOS_DATE: 06/22/2017

BASEBOARD_MANUFACTURER: Micro-Star International Co., Ltd

BASEBOARD_PRODUCT: B350M BAZOOKA (MS-7A38)

BASEBOARD_VERSION: 1.0

DUMP_TYPE: 0

BUGCHECK_P1: c0000005

BUGCHECK_P2: fffff80290368f7f

BUGCHECK_P3: fffff905f33553e0

BUGCHECK_P4: 0

EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - The instruction at 0x%p referenced memory at 0x%p. The memory could not be %s.

FAULTING_IP:
nt!CmpGetNameControlBlock+12f
fffff802`90368f7f 413b18 cmp ebx,dword ptr [r8]

CONTEXT: fffff905f33553e0 -- (.cxr 0xfffff905f33553e0)
rax=ffffa18eccc2a000 rbx=00000000097cb881 rcx=0000000000006f70
rdx=000000000000ffe0 rsi=0000000000000001 rdi=00000000c1fc80b7
rip=fffff80290368f7f rsp=fffff905f3355dd0 rbp=0000000000000005
r8=00000000e81ea434 r9=000000000000ffff r10=0000000000000000
r11=fffff8028fff4347 r12=0000000000006f70 r13=00000000e81ea42c
r14=fffff905f33562f0 r15=0000000000000000
iopl=0 nv up ei pl nz na pe nc
cs=0010 ss=0018 ds=002b es=002b fs=0053 gs=002b efl=00010202
nt!CmpGetNameControlBlock+0x12f:
fffff802`90368f7f 413b18 cmp ebx,dword ptr [r8] ds:002b:00000000`e81ea434=????????
Resetting default scope

CPU_COUNT: 10

CPU_MHZ: bb8

CPU_VENDOR: AuthenticAMD

CPU_FAMILY: 17

CPU_MODEL: 1

CPU_STEPPING: 1

DEFAULT_BUCKET_ID: WIN8_DRIVER_FAULT

BUGCHECK_STR: 0x3B

PROCESS_NAME: wermgr.exe

CURRENT_IRQL: 0

ANALYSIS_SESSION_HOST: DESKTOP-AONPRD7

ANALYSIS_SESSION_TIME: 11-07-2017 20:57:04.0467

ANALYSIS_VERSION: 10.0.15063.468 amd64fre

LAST_CONTROL_TRANSFER: from fffff80290368a2c to fffff80290368f7f

STACK_TEXT:
fffff905`f3355dd0 fffff802`90368a2c : fffff905`f33562f0 ffffa18e`ccc30005 00000000`e81ea434 00000000`e81ea42c : nt!CmpGetNameControlBlock+0x12f
fffff905`f3355e50 fffff802`9036860e : 00000000`ffffffff 00000000`097cb881 00000000`0000000c 00000000`00000000 : nt!CmpCreateKeyControlBlock+0x16c
fffff905`f3355ee0 fffff802`903ad1eb : ffffa18e`ccc3c728 fffff905`f33561a0 fffff905`f3356138 fffff905`f33561c0 : nt!CmpWalkOneLevel+0x55e
fffff905`f3355fe0 fffff802`903a9220 : 00000000`0000001c fffff905`f33564d0 fffff905`f3356448 ffffa18e`d97d8e30 : nt!CmpDoParseKey+0x12db
fffff905`f33563d0 fffff802`903afef7 : 00000000`00000001 00000002`00000001 00000000`00000000 00007ffc`00000001 : nt!CmpParseKey+0x270
fffff905`f33565b0 fffff802`903a75d0 : ffffce81`1b04d000 fffff905`f3356808 fffff905`00000040 ffffce81`196bdce0 : nt!ObpLookupObjectName+0x5b7
fffff905`f3356770 fffff802`903a725d : 00000000`00000001 ffffce81`196bdce0 00000000`00000000 00000000`00000000 : nt!ObOpenObjectByNameEx+0x1e0
fffff905`f33568b0 fffff802`903a4e17 : 000000a6`b9bdca01 00000000`00000000 00000000`00000002 00000000`00000002 : nt!CmOpenKey+0x29d
fffff905`f3356ac0 fffff802`8fff2d53 : ffffce81`1ae60200 00000000`00000002 ffffce81`1ae60200 ffffffff`80000002 : nt!NtOpenKeyEx+0xf
fffff905`f3356b00 00007ffc`f7f12114 : 00007ffc`f43aff1c 00000000`0000007c 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x13
000000a6`b9bdc7e8 00007ffc`f43aff1c : 00000000`0000007c 00000000`00000000 00000000`00000000 00000000`00000004 : ntdll!NtOpenKeyEx+0x14
000000a6`b9bdc7f0 00007ffc`f43aefb4 : 00000000`00000000 000000a6`b9bdcc58 000000a6`b9bdcb38 00000000`0000007c : KERNELBASE!LocalBaseRegOpenKey+0x1bc
000000a6`b9bdcb10 00007ffc`f43aee59 : 00000000`0000007c 00000000`00000000 00000000`00000000 00000000`00000000 : KERNELBASE!RegOpenKeyExInternalW+0x144
000000a6`b9bdcbb0 00007ffc`f2968145 : 00000000`00000016 00000000`00000000 00003943`1034eb4a 00000000`00000000 : KERNELBASE!RegOpenKeyExW+0x19
000000a6`b9bdcbf0 00007ffc`f291e367 : 00000000`00000004 00000000`00000000 00000000`00000000 00000000`00000000 : wer!UtilRegGetDWORD+0x5d
000000a6`b9bdcc50 00007ff6`3abc28ee : 00000000`00000000 00007ff6`00000001 00000000`80000000 000000a6`b9bdda08 : wer!WerpIsTransportAvailable+0xf7
000000a6`b9bdd8c0 00007ff6`3abc3af5 : 00000000`00000000 00000000`00000002 00000256`00000004 000000a6`00000000 : wermgr!DoCoreUpload+0x1ce
000000a6`b9bdd970 00007ff6`3abcfdb3 : 00000256`96f8350f 00000000`00000000 00000000`00000000 00000000`00000000 : wermgr!WinMain+0xb75
000000a6`b9bdfd10 00007ffc`f5ec1fe4 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : wermgr!WinMainCRTStartup+0x1b3
000000a6`b9bdfdd0 00007ffc`f7edef91 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : KERNEL32!BaseThreadInitThunk+0x14
000000a6`b9bdfe00 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : ntdll!RtlUserThreadStart+0x21


THREAD_SHA1_HASH_MOD_FUNC: 063cb92ac2d8ee1463e30eecd2f45d86ac387f11

THREAD_SHA1_HASH_MOD_FUNC_OFFSET: 6bc0fe2f76ffbafa73db1e2031b97fa371007b1f

THREAD_SHA1_HASH_MOD: 8d94ff93c741555a329b8b687b2d87cea952705c

FOLLOWUP_IP:
nt!CmpGetNameControlBlock+12f
fffff802`90368f7f 413b18 cmp ebx,dword ptr [r8]

FAULT_INSTR_CODE: f183b41

SYMBOL_STACK_INDEX: 0

SYMBOL_NAME: nt!CmpGetNameControlBlock+12f

FOLLOWUP_NAME: MachineOwner

MODULE_NAME: nt

IMAGE_NAME: ntkrnlmp.exe

DEBUG_FLR_IMAGE_TIMESTAMP: 59dc593b

STACK_COMMAND: .cxr 0xfffff905f33553e0 ; kb

BUCKET_ID_FUNC_OFFSET: 12f

FAILURE_BUCKET_ID: 0x3B_nt!CmpGetNameControlBlock

BUCKET_ID: 0x3B_nt!CmpGetNameControlBlock

PRIMARY_PROBLEM_CLASS: 0x3B_nt!CmpGetNameControlBlock

TARGET_TIME: 2017-11-07T08:58:51.000Z

OSBUILD: 16299

OSSERVICEPACK: 0

SERVICEPACK_NUMBER: 0

OS_REVISION: 0

SUITE_MASK: 272

PRODUCT_TYPE: 1

OSPLATFORM_TYPE: x64

OSNAME: Windows 10

OSEDITION: Windows 10 WinNt TerminalServer SingleUserTS

OS_LOCALE:

USER_LCID: 0

OSBUILD_TIMESTAMP: 2017-10-10 16:23:07

BUILDDATESTAMP_STR: 170928-1534

BUILDLAB_STR: rs3_release

BUILDOSVER_STR: 10.0.16299.15.amd64fre.rs3_release.170928-1534

ANALYSIS_SESSION_ELAPSED_TIME: 56c

ANALYSIS_SOURCE: KM

FAILURE_ID_HASH_STRING: km:0x3b_nt!cmpgetnamecontrolblock

FAILURE_ID_HASH: {721d647c-6836-abb8-281b-de758f103503}

Followup: MachineOwner
---------

2: kd> lmvm nt
Browse full module list
start end module name
fffff802`8fe84000 fffff802`90756000 nt (pdb symbols) c:\symbols\ntkrnlmp.pdb\69655CA159E34511BF7BEB82660886E31\ntkrnlmp.pdb
Loaded symbol image file: ntkrnlmp.exe
Image path: ntkrnlmp.exe
Image name: ntkrnlmp.exe
Browse all global symbols functions data
Timestamp: Tue Oct 10 16:23:07 2017 (59DC593B)
CheckSum: 0083D03D
ImageSize: 008D2000
Translations: 0000.04b0 0000.04e4 0409.04b0 0409.04e4