I recently build a new pc and overclocked it and I ran into a crash while playing a game, I am no expert on overclocking so I'm not sure where I went wrong here any help is appreciated.
my specs are...
CPU: Intel Core i9 9900KF (with Dark rock pro 4 cooler)
MB: MSI MPG Z390 gaming edge AC
RAM: G.SKILL Ripjaws V 16gb (2x8 GB) ddr4 3600
GPU: EVGA Geforce RTX 2070 SUPER BLACK GAMING 8GB
PSU: Corsair RM850x
Storage: Intel 660p 1TB m.2
I overclocked the i9 to 5ghz all cores @1.31v adaptive and enabled xmp mode. My BIOS is up to date (A.60) and so is my graphics drivers, I've ran system file checker and Memtest86 and there were no errors. I did a stress test with cinebench and cpu-z as well as prime95 small ffts and blend but no crashes or problems.
here's my crash dump below
Microsoft (R) Windows Debugger Version 10.0.19528.1000 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [C:\Users\grego\Desktop\012320-6531-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
Path validation summary *
Response Time (ms) Location
Deferred srv*
Symbol search path is: srv*
Executable search path is:
Windows 10 Kernel Version 18362 MP (16 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS
Machine Name:
Kernel base = 0xfffff80669400000 PsLoadedModuleList = 0xfffff80669848150
Debug session time: Thu Jan 23 19:52:17.611 2020 (UTC - 8:00)
System Uptime: 4 days 3:07:00.997
Loading Kernel Symbols
...............................................................
................................................................
................................................................
.....
Loading User Symbols
Loading unloaded module list
..................................................
For analysis of this file, run !analyze -v
nt!KeBugCheckEx:
fffff806695c14e0 48894c2408 mov qword ptr [rsp+8],rcx ss:0018:ffffa180592e1710=000000000000000a
7: kd> !analyze -v
***
DRIVER_IRQL_NOT_LESS_OR_EQUAL (d1)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high. This is usually
caused by drivers using improper addresses.
If kernel debugger is available get stack backtrace.
Arguments:
Arg1: ffffd029f11f4b13, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000008, value 0 = read operation, 1 = write operation
Arg4: ffffd029f11f4b13, address which referenced memory
Debugging Details:
------------------
KEY_VALUES_STRING: 1
Key : Analysis.CPU.Sec
Value: 1
Key : Analysis.DebugAnalysisProvider.CPP
Value: Create: 8007007e on GREGPC1
Key : Analysis.DebugData
Value: CreateObject
Key : Analysis.DebugModel
Value: CreateObject
Key : Analysis.Elapsed.Sec
Value: 1
Key : Analysis.Memory.CommitPeak.Mb
Value: 70
Key : Analysis.System
Value: CreateObject
ADDITIONAL_XML: 1
DUMP_FILE_ATTRIBUTES: 0x8
Kernel Generated Triage Dump
BUGCHECK_CODE: d1
BUGCHECK_P1: ffffd029f11f4b13
BUGCHECK_P2: 2
BUGCHECK_P3: 8
BUGCHECK_P4: ffffd029f11f4b13
READ_ADDRESS: fffff806699733b8: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
fffff8066982a3c8: Unable to get Flags value from nt!KdVersionBlock
fffff8066982a3c8: Unable to get Flags value from nt!KdVersionBlock
unable to get nt!MmSpecialPagesInUse
ffffd029f11f4b13
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: dwm.exe
TRAP_FRAME: ffffa180592e1850 -- (.trap 0xffffa180592e1850)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=fffff80669eb90b0 rbx=0000000000000000 rcx=ffffa180592e1b50
rdx=0000000000000000 rsi=0000000000000000 rdi=0000000000000000
rip=ffffd029f11f4b13 rsp=ffffa180592e19e8 rbp=0000000000000001
r8=0000000000000008 r9=0000000000000000 r10=fffff80669eb9070
r11=ffff800199fb9180 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei pl nz na pe nc
ffffd029f11f4b13 ?? ???
Resetting default scope
FAILED_INSTRUCTION_ADDRESS:
+0
ffffd029f11f4b13 ?? ???
STACK_TEXT:
ffffa180592e1708 fffff806695d32e9 : 000000000000000a ffffd029f11f4b13 0000000000000002 0000000000000008 : nt!KeBugCheckEx
ffffa180592e1710 fffff806695cf62b : 0000000000000000 ffffc0832e6147e0 ffffc08330ac9630 ffffc08330ac9570 : nt!KiBugCheckDispatch+0x69
ffffa180592e1850 ffffd029f11f4b13 : 0000000000000001 0000000000000000 0000000000000096 00003f7cd19eb818 : nt!KiPageFault+0x46b
ffffa180592e19e8 0000000000000001 : 0000000000000000 0000000000000096 00003f7cd19eb818 fffff8066c7a95fa : 0xffffd029f11f4b13
ffffa180592e19f0 0000000000000000 : 0000000000000096 00003f7cd19eb818 fffff8066c7a95fa 00000000`00000000 : 0x1
SYMBOL_NAME: nt!KiPageFault+46b
MODULE_NAME: nt
IMAGE_NAME: ntkrnlmp.exe
IMAGE_VERSION: 10.0.18362.592
STACK_COMMAND: .thread ; .cxr ; kb
BUCKET_ID_FUNC_OFFSET: 46b
FAILURE_BUCKET_ID: AV_CODE_AV_BAD_IP_nt!KiPageFault
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {73cd60cc-83fa-6b76-df08-1961c31d7403}
Followup: MachineOwner
---------
my specs are...
CPU: Intel Core i9 9900KF (with Dark rock pro 4 cooler)
MB: MSI MPG Z390 gaming edge AC
RAM: G.SKILL Ripjaws V 16gb (2x8 GB) ddr4 3600
GPU: EVGA Geforce RTX 2070 SUPER BLACK GAMING 8GB
PSU: Corsair RM850x
Storage: Intel 660p 1TB m.2
I overclocked the i9 to 5ghz all cores @1.31v adaptive and enabled xmp mode. My BIOS is up to date (A.60) and so is my graphics drivers, I've ran system file checker and Memtest86 and there were no errors. I did a stress test with cinebench and cpu-z as well as prime95 small ffts and blend but no crashes or problems.
here's my crash dump below
Microsoft (R) Windows Debugger Version 10.0.19528.1000 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [C:\Users\grego\Desktop\012320-6531-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
Path validation summary *
Response Time (ms) Location
Deferred srv*
Symbol search path is: srv*
Executable search path is:
Windows 10 Kernel Version 18362 MP (16 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS
Machine Name:
Kernel base = 0xfffff80669400000 PsLoadedModuleList = 0xfffff80669848150
Debug session time: Thu Jan 23 19:52:17.611 2020 (UTC - 8:00)
System Uptime: 4 days 3:07:00.997
Loading Kernel Symbols
...............................................................
................................................................
................................................................
.....
Loading User Symbols
Loading unloaded module list
..................................................
For analysis of this file, run !analyze -v
nt!KeBugCheckEx:
fffff806695c14e0 48894c2408 mov qword ptr [rsp+8],rcx ss:0018:ffffa180592e1710=000000000000000a
7: kd> !analyze -v
***
- *
- Bugcheck Analysis *
- *
DRIVER_IRQL_NOT_LESS_OR_EQUAL (d1)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high. This is usually
caused by drivers using improper addresses.
If kernel debugger is available get stack backtrace.
Arguments:
Arg1: ffffd029f11f4b13, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000008, value 0 = read operation, 1 = write operation
Arg4: ffffd029f11f4b13, address which referenced memory
Debugging Details:
------------------
KEY_VALUES_STRING: 1
Key : Analysis.CPU.Sec
Value: 1
Key : Analysis.DebugAnalysisProvider.CPP
Value: Create: 8007007e on GREGPC1
Key : Analysis.DebugData
Value: CreateObject
Key : Analysis.DebugModel
Value: CreateObject
Key : Analysis.Elapsed.Sec
Value: 1
Key : Analysis.Memory.CommitPeak.Mb
Value: 70
Key : Analysis.System
Value: CreateObject
ADDITIONAL_XML: 1
DUMP_FILE_ATTRIBUTES: 0x8
Kernel Generated Triage Dump
BUGCHECK_CODE: d1
BUGCHECK_P1: ffffd029f11f4b13
BUGCHECK_P2: 2
BUGCHECK_P3: 8
BUGCHECK_P4: ffffd029f11f4b13
READ_ADDRESS: fffff806699733b8: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
fffff8066982a3c8: Unable to get Flags value from nt!KdVersionBlock
fffff8066982a3c8: Unable to get Flags value from nt!KdVersionBlock
unable to get nt!MmSpecialPagesInUse
ffffd029f11f4b13
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: dwm.exe
TRAP_FRAME: ffffa180592e1850 -- (.trap 0xffffa180592e1850)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=fffff80669eb90b0 rbx=0000000000000000 rcx=ffffa180592e1b50
rdx=0000000000000000 rsi=0000000000000000 rdi=0000000000000000
rip=ffffd029f11f4b13 rsp=ffffa180592e19e8 rbp=0000000000000001
r8=0000000000000008 r9=0000000000000000 r10=fffff80669eb9070
r11=ffff800199fb9180 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei pl nz na pe nc
ffffd029f11f4b13 ?? ???
Resetting default scope
FAILED_INSTRUCTION_ADDRESS:
+0
ffffd029f11f4b13 ?? ???
STACK_TEXT:
ffffa180592e1708 fffff806695d32e9 : 000000000000000a ffffd029f11f4b13 0000000000000002 0000000000000008 : nt!KeBugCheckEx
ffffa180592e1710 fffff806695cf62b : 0000000000000000 ffffc0832e6147e0 ffffc08330ac9630 ffffc08330ac9570 : nt!KiBugCheckDispatch+0x69
ffffa180592e1850 ffffd029f11f4b13 : 0000000000000001 0000000000000000 0000000000000096 00003f7cd19eb818 : nt!KiPageFault+0x46b
ffffa180592e19e8 0000000000000001 : 0000000000000000 0000000000000096 00003f7cd19eb818 fffff8066c7a95fa : 0xffffd029f11f4b13
ffffa180592e19f0 0000000000000000 : 0000000000000096 00003f7cd19eb818 fffff8066c7a95fa 00000000`00000000 : 0x1
SYMBOL_NAME: nt!KiPageFault+46b
MODULE_NAME: nt
IMAGE_NAME: ntkrnlmp.exe
IMAGE_VERSION: 10.0.18362.592
STACK_COMMAND: .thread ; .cxr ; kb
BUCKET_ID_FUNC_OFFSET: 46b
FAILURE_BUCKET_ID: AV_CODE_AV_BAD_IP_nt!KiPageFault
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {73cd60cc-83fa-6b76-df08-1961c31d7403}
Followup: MachineOwner
---------
Last edited: