Hey folks,
UPDATED BELOW, ALSO SECOND DRIVER VERIFIER DUMP.
I built a new shiny mini-ITX desktop in September and I've been getting MEMORY_MANAGEMENT BSODs which are growing more and more frequent.
To troubleshoot I've:
1) Clean re-installed OS and everything else.
2) Un-overclocked my Ryzen 1700 and Corsair DDR4 3000MHz back to defaults (this was working fine and stable for weeks until the first BSOD occurred).
3) Kept drivers and windows updates up to date.
4) Run Memtest86 from USB - NAD (let it run for almost 2 hours).
5) Run the inbuilt Windows Memtest -NAD.
5) Run sfc /scannow on my hdd - NAD.
6) Disabled Virtual Memory for C:\ (128GB SSD for my OS and essentials).
7) chkdsk /f /r
8) Uninstalled GEFORCE Experience and just installed the driver
I can't for the life of me suss it out - it started re-BSODing half an hour after re-installing Windows. I'm starting to think it may be my C:\ HDD, yet I'm not getting anything from troubleshooting.
I would greatly appreciate any help!
UPDATE: ran driver verifier and amdpsp.sys repeatedly BSOD'd the computer. I uninstalled the AMD Ryzen software as well as the AMD driver package. The .sys file is still present in the drivers folder! I can't for the life of me figure out where it's from. Will see if re-flashing the BIOS works...
My full dump is as follows:
Microsoft (R) Windows Debugger Version 10.0.16299.15 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [C:\Windows\MEMORY.DMP]
Kernel Bitmap Dump File: Full address space is available
************* Path validation summary **************
Response Time (ms) Location
OK C:\symbols
Symbol search path is: C:\symbols
Executable search path is:
Windows 10 Kernel Version 16299 MP (16 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS
Built by: 16299.15.amd64fre.rs3_release.170928-1534
Machine Name:
Kernel base = 0xfffff803`72a1f000 PsLoadedModuleList = 0xfffff803`72d80fd0
Debug session time: Sun Oct 29 22:20:35.251 2017 (UTC + 0:00)
System Uptime: 2 days 7:13:13.921
Loading Kernel Symbols
...............................................................
................................................................
................................................................
......
Loading User Symbols
PEB is paged out (Peb.Ldr = 000000ff`f9ad3018). Type ".hh dbgerr001" for details
Loading unloaded module list
..................................
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
Use !analyze -v to get detailed debugging information.
BugCheck 1A, {41793, ffff80811012c8f8, 12, 11}
Probably caused by : memory_corruption ( nt!MiDeleteVirtualAddresses+10c945 )
Followup: MachineOwner
---------
15: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
MEMORY_MANAGEMENT (1a)
# Any other values for parameter 1 must be individually examined.
Arguments:
Arg1: 0000000000041793, The subtype of the bugcheck.
Arg2: ffff80811012c8f8
Arg3: 0000000000000012
Arg4: 0000000000000011
Debugging Details:
------------------
DUMP_CLASS: 1
DUMP_QUALIFIER: 402
BUILD_VERSION_STRING: 16299.15.amd64fre.rs3_release.170928-1534
SYSTEM_PRODUCT_NAME: To Be Filled By O.E.M.
SYSTEM_SKU: To Be Filled By O.E.M.
SYSTEM_VERSION: To Be Filled By O.E.M.
BIOS_VENDOR: American Megatrends Inc.
BIOS_VERSION: P3.10
BIOS_DATE: 08/25/2017
BASEBOARD_MANUFACTURER: ASRock
BASEBOARD_PRODUCT: X370 Gaming-ITX/ac
BASEBOARD_VERSION:
DUMP_TYPE: 0
BUGCHECK_P1: 41793
BUGCHECK_P2: ffff80811012c8f8
BUGCHECK_P3: 12
BUGCHECK_P4: 11
BUGCHECK_STR: 0x1a_41793
CPU_COUNT: 10
CPU_MHZ: bb2
CPU_VENDOR: AuthenticAMD
CPU_FAMILY: 17
CPU_MODEL: 1
CPU_STEPPING: 1
DEFAULT_BUCKET_ID: WIN8_DRIVER_FAULT
PROCESS_NAME: svchost.exe
CURRENT_IRQL: 2
ANALYSIS_SESSION_HOST: GIZMOMKIII
ANALYSIS_SESSION_TIME: 10-29-2017 23:04:47.0360
ANALYSIS_VERSION: 10.0.16299.15 amd64fre
LAST_CONTROL_TRANSFER: from fffff80372bc38d5 to fffff80372b82960
STACK_TEXT:
ffff8189`3fb09418 fffff803`72bc38d5 : 00000000`0000001a 00000000`00041793 ffff8081`1012c8f8 00000000`00000012 : nt!KeBugCheckEx
ffff8189`3fb09420 fffff803`72ab3af6 : 00000000`00000000 ffff9c00`c5d95700 00000000`00000000 ffff9c00`c5d0f5c0 : nt!MiDeleteVirtualAddresses+0x10c945
ffff8189`3fb09710 fffff803`72f33a1a : ffff9c00`c5d95700 ffff9c00`b870cc70 ffff9c00`b870cc70 ffff9c00`c5d95700 : nt!MiDeleteVad+0x3b6
ffff8189`3fb09860 fffff803`72f3384e : ffffffff`00000000 ffff9c00`c21cbd10 ffff9c00`b870cc70 ffff9c00`c5d95700 : nt!MiCleanVad+0x3a
ffff8189`3fb09890 fffff803`72ef3039 : ffffffff`ffffffff ffff9c00`c5d0f5c0 ffff9c00`c5d0f8b8 fffff803`72ebeea6 : nt!MmCleanProcessAddressSpace+0x12e
ffff8189`3fb09910 fffff803`72ed5da7 : ffff9c00`c5d0f5c0 ffffb30d`7ffa5170 ffff8189`3fb09b80 00000000`00000000 : nt!PspRundownSingleProcess+0x129
ffff8189`3fb09990 fffff803`72ed6e17 : 00000000`00000000 ffff8189`3fb09b01 000000ff`f9ad4000 ffff9c00`c5d95700 : nt!PspExitThread+0x583
ffff8189`3fb09a90 fffff803`72b8dd53 : 00000000`00003a30 ffff9c00`c5d95700 ffff9c00`c5d0f5c0 00000000`00000000 : nt!NtTerminateProcess+0xeb
ffff8189`3fb09b00 00007ff9`fb5503c4 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x13
000000ff`f989fe38 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ff9`fb5503c4
THREAD_SHA1_HASH_MOD_FUNC: 66b70bb23aa87ecd3790f5db7fe42422debab9f7
THREAD_SHA1_HASH_MOD_FUNC_OFFSET: e252102500c8d0d367467fe1b709555a7dc78e3c
THREAD_SHA1_HASH_MOD: 9f457f347057f10e1df248e166a3e95e6570ecfe
FOLLOWUP_IP:
nt!MiDeleteVirtualAddresses+10c945
fffff803`72bc38d5 cc int 3
FAULT_INSTR_CODE: c48b4dcc
SYMBOL_STACK_INDEX: 1
SYMBOL_NAME: nt!MiDeleteVirtualAddresses+10c945
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: nt
DEBUG_FLR_IMAGE_TIMESTAMP: 59dc593b
STACK_COMMAND: .thread ; .cxr ; kb
IMAGE_NAME: memory_corruption
BUCKET_ID_FUNC_OFFSET: 10c945
FAILURE_BUCKET_ID: 0x1a_41793_nt!MiDeleteVirtualAddresses
BUCKET_ID: 0x1a_41793_nt!MiDeleteVirtualAddresses
PRIMARY_PROBLEM_CLASS: 0x1a_41793_nt!MiDeleteVirtualAddresses
TARGET_TIME: 2017-10-29T22:20:35.000Z
OSBUILD: 16299
OSSERVICEPACK: 0
SERVICEPACK_NUMBER: 0
OS_REVISION: 0
SUITE_MASK: 272
PRODUCT_TYPE: 1
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
OSEDITION: Windows 10 WinNt TerminalServer SingleUserTS
OS_LOCALE:
USER_LCID: 0
OSBUILD_TIMESTAMP: 2017-10-10 06:23:07
BUILDDATESTAMP_STR: 170928-1534
BUILDLAB_STR: rs3_release
BUILDOSVER_STR: 10.0.16299.15.amd64fre.rs3_release.170928-1534
ANALYSIS_SESSION_ELAPSED_TIME: d6e
ANALYSIS_SOURCE: KM
FAILURE_ID_HASH_STRING: km:0x1a_41793_nt!mideletevirtualaddresses
FAILURE_ID_HASH: {0730eb34-d667-1bcc-76fe-94b17390a3ef}
Followup: MachineOwner
DUMP 2:
DRIVER_VERIFIER_DETECTED_VIOLATION (c4)
A device driver attempting to corrupt the system has been caught. This is
because the driver was specified in the registry as being suspect (by the
administrator) and the kernel has enabled substantial checking of this driver.
If the driver attempts to corrupt the system, bugchecks 0xC4, 0xC1 and 0xA will
be among the most commonly seen crashes.
Arguments:
Arg1: 0000000000002000, Code Integrity Issue: The caller specified an executable pool type. (Expected: NonPagedPoolNx)
Arg2: fffff8081acc702b, The address in the driver's code where the error was detected.
Arg3: 0000000000000000, Pool Type.
Arg4: 0000000000544545, Pool Tag (if provided).
Debugging Details:
------------------
DUMP_CLASS: 1
DUMP_QUALIFIER: 402
BUILD_VERSION_STRING: 10.0.16299.19 (WinBuild.160101.0800)
SYSTEM_PRODUCT_NAME: To Be Filled By O.E.M.
SYSTEM_SKU: To Be Filled By O.E.M.
SYSTEM_VERSION: To Be Filled By O.E.M.
BIOS_VENDOR: American Megatrends Inc.
BIOS_VERSION: P3.10
BIOS_DATE: 08/25/2017
BASEBOARD_MANUFACTURER: ASRock
BASEBOARD_PRODUCT: X370 Gaming-ITX/ac
BASEBOARD_VERSION:
DUMP_TYPE: 0
BUGCHECK_P1: 2000
BUGCHECK_P2: fffff8081acc702b
BUGCHECK_P3: 0
BUGCHECK_P4: 544545
BUGCHECK_STR: 0xc4_2000
CPU_COUNT: 10
CPU_MHZ: bb2
CPU_VENDOR: AuthenticAMD
CPU_FAMILY: 17
CPU_MODEL: 1
CPU_STEPPING: 1
DEFAULT_BUCKET_ID: WIN8_DRIVER_FAULT
PROCESS_NAME: System
CURRENT_IRQL: 0
ANALYSIS_SESSION_HOST: GIZMOMKIII
ANALYSIS_SESSION_TIME: 11-03-2017 22:20:24.0465
ANALYSIS_VERSION: 10.0.16299.15 amd64fre
LOCK_ADDRESS: fffff800fdd89ec0 -- (!locks fffff800fdd89ec0)
Resource @ nt!PiEngineLock (0xfffff800fdd89ec0) Exclusively owned
Contention Count = 1
NumberOfExclusiveWaiters = 1
Threads: ffffe38b11b79040-01<*>
Threads Waiting On Exclusive Access:
ffffe38b11b88040
1 total locks
PNP_TRIAGE:
Lock address : 0xfffff800fdd89ec0
Thread Count : 1
Thread address: 0xffffe38b11b79040
Thread wait : 0x240
LAST_CONTROL_TRANSFER: from fffff800fe1b5293 to fffff800fdb71960
STACK_TEXT:
ffffe00b`100c99b8 fffff800`fe1b5293 : 00000000`000000c4 00000000`00002000 fffff808`1acc702b 00000000`00000000 : nt!KeBugCheckEx
ffffe00b`100c99c0 fffff800`fdc7d52f : fffff800`fdd5f984 00000000`00002000 fffff808`1acc702b 00000000`00000000 : nt!VerifierBugCheckIfAppropriate+0xdf
ffffe00b`100c9a00 fffff800`fe1ad3cc : 00000000`00544545 fffff800`fdd5f984 fffff808`1acc702b ffffdffc`040cbaf8 : nt!VfReportIssueWithOptions+0x103
ffffe00b`100c9a50 fffff800`fe1ab381 : 00000000`00544545 ffffe00b`100c9b10 00000000`00000000 00000000`00000001 : nt!VfCheckPoolType+0x90
ffffe00b`100c9a90 fffff808`1acc702b : ffffe38b`12ba1380 00000000`00000005 00000000`00411030 ffffe00b`00000001 : nt!VerifierExAllocatePoolEx+0x21
ffffe00b`100c9ae0 fffff808`1acb12ba : 00000000`00000000 ffffe38b`12ba1380 00000000`00000005 fffff808`1943028c : amdpsp+0x1702b
ffffe00b`100c9b20 fffff808`1acb1089 : ffffe38b`12ba1380 00000000`00000000 fffff800`fdd90e30 fffff808`1945c853 : amdpsp+0x12ba
ffffe00b`100c9b50 fffff808`19434913 : ffffe38b`12ba2e78 00000000`000001e0 ffffe00b`100c9c50 ffffe00b`100c9c00 : amdpsp+0x1089
ffffe00b`100c9b80 fffff808`194348ba : ffffe38b`12ba2900 ffff8d80`00c81990 ffffe00b`100c000e ffffe00b`100c9c78 : Wdf01000!FxPnpDeviceD0Entry::InvokeClient+0x23
ffffe00b`100c9be0 fffff808`19436836 : ffffe00b`100c9d50 00000000`00000000 00000000`0000030f 00000000`00000000 : Wdf01000!FxPrePostCallback::InvokeStateful+0x5a
ffffe00b`100c9c20 fffff808`194292c8 : ffffe38b`12ba2950 ffffe38b`12ba2950 00000000`0000030f 00000000`00000000 : Wdf01000!FxPkgPnp:😛owerD0Starting+0x46
ffffe00b`100c9c50 fffff808`19428203 : ffffe38b`12ba2b50 ffffe38b`00000000 ffffe38b`12ba2b28 00000000`00000000 : Wdf01000!FxPkgPnp:😛owerProcessEventInner+0x1f8
ffffe00b`100c9dc0 fffff808`1942f252 : 00000000`00000000 ffffe38b`12ba2900 00000000`00000000 00000000`00000000 : Wdf01000!FxPkgPnp:😛owerProcessEvent+0x143
ffffe00b`100c9e60 fffff808`1942cd2f : ffffe38b`12ba2950 ffffe00b`100c9f90 00000000`00000000 00000000`00000000 : Wdf01000!FxPkgPnp:😛owerPolStarting+0x52
ffffe00b`100c9e90 fffff808`194297fd : ffffe38b`12ba2c28 00001c74`00000000 fffff808`194ac2c0 fffff808`19434800 : Wdf01000!FxPkgPnp:😛owerPolicyProcessEventInner+0x1ff
ffffe00b`100ca000 fffff808`19421042 : 00000000`00000000 ffffe38b`12ba2950 ffffe38b`12ba5b60 ffffe38b`12ba2950 : Wdf01000!FxPkgPnp:😛owerPolicyProcessEvent+0x13d
ffffe00b`100ca0a0 fffff808`1942a451 : ffffe38b`12ba2901 00000000`00000102 ffffe38b`12ba2950 00000000`00000108 : Wdf01000!FxPkgPnp:😛npEventHardwareAvailable+0xb2
ffffe00b`100ca0e0 fffff808`19427fad : ffffe38b`12ba2aa8 fffff808`00000000 ffffe38b`12ba2a80 00000000`00000000 : Wdf01000!FxPkgPnp:😛npProcessEventInner+0x1a1
ffffe00b`100ca190 fffff808`19437dda : 00000000`00000000 00000000`00000000 00000000`00000008 ffffe00b`100ca2c8 : Wdf01000!FxPkgPnp:😛npProcessEvent+0x12d
ffffe00b`100ca230 fffff808`19407d9e : ffffe38b`12ba1090 00000000`00000000 00000000`00000000 ffffe38b`12ba2950 : Wdf01000!FxPkgPnp::_PnpStartDevice+0x4a
ffffe00b`100ca290 fffff808`19407400 : ffff818e`80be6dc0 ffffe38b`12ba1090 ffffe38b`12ba2950 fffff800`fe1c323b : Wdf01000!FxPkgPnp:😀ispatch+0xee
ffffe00b`100ca330 fffff800`fdb2755a : ffffe38b`12ba3860 fffff800`fe1b5610 ffff818e`00000000 ffff818e`00000000 : Wdf01000!FxDevice:😀ispatchWithLock+0x150
ffffe00b`100ca420 fffff800`fe1a9d5d : ffff818e`80be6dc0 ffffe38b`12ba3860 ffffe38b`11be8300 fffff800`fe1b45fc : nt!IopfCallDriver+0x56
ffffe00b`100ca460 fffff800`fdb9fa51 : ffff818e`80be6dc0 00000000`00000000 ffffe38b`12ba5b60 ffffe38b`12c76800 : nt!IovCallDriver+0x275
ffffe00b`100ca4a0 fffff800`fe1c7ec2 : ffff818e`80be6dc0 00000000`00000000 ffffe38b`12ba5b60 00000000`00000000 : nt!IofCallDriver+0x13b771
ffffe00b`100ca4e0 fffff800`fdb2755a : ffffe38b`12ba5cb0 ffff818e`80be6dc0 00000000`00000000 ffffe38b`12ba5b60 : nt!ViFilterDispatchPnp+0x1a2
ffffe00b`100ca520 fffff800`fe1a9d5d : ffff818e`80be6dc0 ffffe38b`12ba5b60 ffffe38b`12dc3840 fffff800`fe1b5b0d : nt!IopfCallDriver+0x56
ffffe00b`100ca560 fffff800`fdb9fa51 : ffff818e`80be6dc0 ffffe00b`100ca6c0 ffffe38b`12ba5b60 ffffe38b`11be8300 : nt!IovCallDriver+0x275
ffffe00b`100ca5a0 fffff800`fde8a9d6 : ffffe38b`0f3f4060 ffffe38b`12dc3840 ffffe00b`100ca630 00000000`00000000 : nt!IofCallDriver+0x13b771
ffffe00b`100ca5e0 fffff800`fda32201 : ffffe38b`0f3f4060 00000000`00000000 ffffe38b`12dc3840 ffffe38b`0f3f6010 : nt!PnpAsynchronousCall+0xea
ffffe00b`100ca620 fffff800`fda32c24 : 00000000`00000000 ffffe38b`0f3f4060 fffff800`fda2f760 ffffcf0b`1d4bf450 : nt!PnpSendIrp+0x91
ffffe00b`100ca690 fffff800`fde6d543 : ffffe38b`0f3f6010 ffffe38b`12dc3840 00000000`00000000 00000000`00000000 : nt!PnpStartDevice+0x88
ffffe00b`100ca720 fffff800`fdf989d3 : ffffe38b`0f3f6010 ffffe00b`100ca8f0 00000000`00000000 ffffe00b`100ca8f0 : nt!PnpStartDeviceNode+0xdb
ffffe00b`100ca7b0 fffff800`fde7fb81 : ffffe38b`0f3f6010 00000000`00000001 00000000`00000002 ffffe38b`0ddefd20 : nt!PipProcessStartPhase1+0x5b
ffffe00b`100ca7f0 fffff800`fdfeb545 : ffffe38b`11bd4160 ffffe00b`100cab19 ffffe38b`11bd4160 ffffe38b`11bd41b0 : nt!PipProcessDevNodeTree+0x42d
ffffe00b`100caa70 fffff800`fdb26014 : ffffe301`00000003 ffffe38b`00000000 ffffe38b`00000000 00000000`00000000 : nt!PiProcessStartSystemDevices+0x59
ffffe00b`100caac0 fffff800`fda68835 : ffffe38b`11b79040 ffffe38b`0cf43b60 fffff800`fdd88940 ffffe38b`0cf43b60 : nt!PnpDeviceActionWorker+0x474
ffffe00b`100cab80 fffff800`fdaf14e7 : ffffa780`5d9c5ec0 00000000`00000080 ffffe38b`0cea1480 ffffe38b`11b79040 : nt!ExpWorkerThread+0xf5
ffffe00b`100cac10 fffff800`fdb76ef6 : ffffa780`5d9b9180 ffffe38b`11b79040 fffff800`fdaf14a0 00000000`00000000 : nt!PspSystemThreadStartup+0x47
ffffe00b`100cac60 00000000`00000000 : ffffe00b`100cb000 ffffe00b`100c5000 00000000`00000000 00000000`00000000 : nt!KiStartSystemThread+0x16
THREAD_SHA1_HASH_MOD_FUNC: 350fbe8e523d781c4121e2748b545cdce07b7ecb
THREAD_SHA1_HASH_MOD_FUNC_OFFSET: a36a93ca6f82fb34b69030e697f401849d6fcf25
THREAD_SHA1_HASH_MOD: fbc29f490326c9a663e974d0f7f05aa4756bc9b3
FOLLOWUP_IP:
amdpsp+1702b
fffff808`1acc702b 488bd8 mov rbx,rax
FAULT_INSTR_CODE: 48d88b48
SYMBOL_STACK_INDEX: 5
SYMBOL_NAME: amdpsp+1702b
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: amdpsp
IMAGE_NAME: amdpsp.sys
DEBUG_FLR_IMAGE_TIMESTAMP: 5935cbec
STACK_COMMAND: .thread ; .cxr ; kb
BUCKET_ID_FUNC_OFFSET: 1702b
FAILURE_BUCKET_ID: 0xc4_2000_VRF_amdpsp!unknown_function
BUCKET_ID: 0xc4_2000_VRF_amdpsp!unknown_function
PRIMARY_PROBLEM_CLASS: 0xc4_2000_VRF_amdpsp!unknown_function
TARGET_TIME: 2017-11-03T21:35:26.000Z
OSBUILD: 16299
OSSERVICEPACK: 19
SERVICEPACK_NUMBER: 0
OS_REVISION: 0
SUITE_MASK: 272
PRODUCT_TYPE: 1
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
OSEDITION: Windows 10 WinNt TerminalServer SingleUserTS
OS_LOCALE:
USER_LCID: 0
OSBUILD_TIMESTAMP: 2017-10-10 06:23:07
BUILDDATESTAMP_STR: 160101.0800
BUILDLAB_STR: WinBuild
BUILDOSVER_STR: 10.0.16299.19
ANALYSIS_SESSION_ELAPSED_TIME: bf3
ANALYSIS_SOURCE: KM
FAILURE_ID_HASH_STRING: km:0xc4_2000_vrf_amdpsp!unknown_function
FAILURE_ID_HASH: {b97f9f3d-1133-776b-9b84-d5446f5bf532}
Followup: MachineOwner
UPDATED BELOW, ALSO SECOND DRIVER VERIFIER DUMP.
I built a new shiny mini-ITX desktop in September and I've been getting MEMORY_MANAGEMENT BSODs which are growing more and more frequent.
To troubleshoot I've:
1) Clean re-installed OS and everything else.
2) Un-overclocked my Ryzen 1700 and Corsair DDR4 3000MHz back to defaults (this was working fine and stable for weeks until the first BSOD occurred).
3) Kept drivers and windows updates up to date.
4) Run Memtest86 from USB - NAD (let it run for almost 2 hours).
5) Run the inbuilt Windows Memtest -NAD.
5) Run sfc /scannow on my hdd - NAD.
6) Disabled Virtual Memory for C:\ (128GB SSD for my OS and essentials).
7) chkdsk /f /r
8) Uninstalled GEFORCE Experience and just installed the driver
I can't for the life of me suss it out - it started re-BSODing half an hour after re-installing Windows. I'm starting to think it may be my C:\ HDD, yet I'm not getting anything from troubleshooting.
I would greatly appreciate any help!
UPDATE: ran driver verifier and amdpsp.sys repeatedly BSOD'd the computer. I uninstalled the AMD Ryzen software as well as the AMD driver package. The .sys file is still present in the drivers folder! I can't for the life of me figure out where it's from. Will see if re-flashing the BIOS works...
My full dump is as follows:
Microsoft (R) Windows Debugger Version 10.0.16299.15 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [C:\Windows\MEMORY.DMP]
Kernel Bitmap Dump File: Full address space is available
************* Path validation summary **************
Response Time (ms) Location
OK C:\symbols
Symbol search path is: C:\symbols
Executable search path is:
Windows 10 Kernel Version 16299 MP (16 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS
Built by: 16299.15.amd64fre.rs3_release.170928-1534
Machine Name:
Kernel base = 0xfffff803`72a1f000 PsLoadedModuleList = 0xfffff803`72d80fd0
Debug session time: Sun Oct 29 22:20:35.251 2017 (UTC + 0:00)
System Uptime: 2 days 7:13:13.921
Loading Kernel Symbols
...............................................................
................................................................
................................................................
......
Loading User Symbols
PEB is paged out (Peb.Ldr = 000000ff`f9ad3018). Type ".hh dbgerr001" for details
Loading unloaded module list
..................................
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
Use !analyze -v to get detailed debugging information.
BugCheck 1A, {41793, ffff80811012c8f8, 12, 11}
Probably caused by : memory_corruption ( nt!MiDeleteVirtualAddresses+10c945 )
Followup: MachineOwner
---------
15: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
MEMORY_MANAGEMENT (1a)
# Any other values for parameter 1 must be individually examined.
Arguments:
Arg1: 0000000000041793, The subtype of the bugcheck.
Arg2: ffff80811012c8f8
Arg3: 0000000000000012
Arg4: 0000000000000011
Debugging Details:
------------------
DUMP_CLASS: 1
DUMP_QUALIFIER: 402
BUILD_VERSION_STRING: 16299.15.amd64fre.rs3_release.170928-1534
SYSTEM_PRODUCT_NAME: To Be Filled By O.E.M.
SYSTEM_SKU: To Be Filled By O.E.M.
SYSTEM_VERSION: To Be Filled By O.E.M.
BIOS_VENDOR: American Megatrends Inc.
BIOS_VERSION: P3.10
BIOS_DATE: 08/25/2017
BASEBOARD_MANUFACTURER: ASRock
BASEBOARD_PRODUCT: X370 Gaming-ITX/ac
BASEBOARD_VERSION:
DUMP_TYPE: 0
BUGCHECK_P1: 41793
BUGCHECK_P2: ffff80811012c8f8
BUGCHECK_P3: 12
BUGCHECK_P4: 11
BUGCHECK_STR: 0x1a_41793
CPU_COUNT: 10
CPU_MHZ: bb2
CPU_VENDOR: AuthenticAMD
CPU_FAMILY: 17
CPU_MODEL: 1
CPU_STEPPING: 1
DEFAULT_BUCKET_ID: WIN8_DRIVER_FAULT
PROCESS_NAME: svchost.exe
CURRENT_IRQL: 2
ANALYSIS_SESSION_HOST: GIZMOMKIII
ANALYSIS_SESSION_TIME: 10-29-2017 23:04:47.0360
ANALYSIS_VERSION: 10.0.16299.15 amd64fre
LAST_CONTROL_TRANSFER: from fffff80372bc38d5 to fffff80372b82960
STACK_TEXT:
ffff8189`3fb09418 fffff803`72bc38d5 : 00000000`0000001a 00000000`00041793 ffff8081`1012c8f8 00000000`00000012 : nt!KeBugCheckEx
ffff8189`3fb09420 fffff803`72ab3af6 : 00000000`00000000 ffff9c00`c5d95700 00000000`00000000 ffff9c00`c5d0f5c0 : nt!MiDeleteVirtualAddresses+0x10c945
ffff8189`3fb09710 fffff803`72f33a1a : ffff9c00`c5d95700 ffff9c00`b870cc70 ffff9c00`b870cc70 ffff9c00`c5d95700 : nt!MiDeleteVad+0x3b6
ffff8189`3fb09860 fffff803`72f3384e : ffffffff`00000000 ffff9c00`c21cbd10 ffff9c00`b870cc70 ffff9c00`c5d95700 : nt!MiCleanVad+0x3a
ffff8189`3fb09890 fffff803`72ef3039 : ffffffff`ffffffff ffff9c00`c5d0f5c0 ffff9c00`c5d0f8b8 fffff803`72ebeea6 : nt!MmCleanProcessAddressSpace+0x12e
ffff8189`3fb09910 fffff803`72ed5da7 : ffff9c00`c5d0f5c0 ffffb30d`7ffa5170 ffff8189`3fb09b80 00000000`00000000 : nt!PspRundownSingleProcess+0x129
ffff8189`3fb09990 fffff803`72ed6e17 : 00000000`00000000 ffff8189`3fb09b01 000000ff`f9ad4000 ffff9c00`c5d95700 : nt!PspExitThread+0x583
ffff8189`3fb09a90 fffff803`72b8dd53 : 00000000`00003a30 ffff9c00`c5d95700 ffff9c00`c5d0f5c0 00000000`00000000 : nt!NtTerminateProcess+0xeb
ffff8189`3fb09b00 00007ff9`fb5503c4 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x13
000000ff`f989fe38 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ff9`fb5503c4
THREAD_SHA1_HASH_MOD_FUNC: 66b70bb23aa87ecd3790f5db7fe42422debab9f7
THREAD_SHA1_HASH_MOD_FUNC_OFFSET: e252102500c8d0d367467fe1b709555a7dc78e3c
THREAD_SHA1_HASH_MOD: 9f457f347057f10e1df248e166a3e95e6570ecfe
FOLLOWUP_IP:
nt!MiDeleteVirtualAddresses+10c945
fffff803`72bc38d5 cc int 3
FAULT_INSTR_CODE: c48b4dcc
SYMBOL_STACK_INDEX: 1
SYMBOL_NAME: nt!MiDeleteVirtualAddresses+10c945
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: nt
DEBUG_FLR_IMAGE_TIMESTAMP: 59dc593b
STACK_COMMAND: .thread ; .cxr ; kb
IMAGE_NAME: memory_corruption
BUCKET_ID_FUNC_OFFSET: 10c945
FAILURE_BUCKET_ID: 0x1a_41793_nt!MiDeleteVirtualAddresses
BUCKET_ID: 0x1a_41793_nt!MiDeleteVirtualAddresses
PRIMARY_PROBLEM_CLASS: 0x1a_41793_nt!MiDeleteVirtualAddresses
TARGET_TIME: 2017-10-29T22:20:35.000Z
OSBUILD: 16299
OSSERVICEPACK: 0
SERVICEPACK_NUMBER: 0
OS_REVISION: 0
SUITE_MASK: 272
PRODUCT_TYPE: 1
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
OSEDITION: Windows 10 WinNt TerminalServer SingleUserTS
OS_LOCALE:
USER_LCID: 0
OSBUILD_TIMESTAMP: 2017-10-10 06:23:07
BUILDDATESTAMP_STR: 170928-1534
BUILDLAB_STR: rs3_release
BUILDOSVER_STR: 10.0.16299.15.amd64fre.rs3_release.170928-1534
ANALYSIS_SESSION_ELAPSED_TIME: d6e
ANALYSIS_SOURCE: KM
FAILURE_ID_HASH_STRING: km:0x1a_41793_nt!mideletevirtualaddresses
FAILURE_ID_HASH: {0730eb34-d667-1bcc-76fe-94b17390a3ef}
Followup: MachineOwner
DUMP 2:
DRIVER_VERIFIER_DETECTED_VIOLATION (c4)
A device driver attempting to corrupt the system has been caught. This is
because the driver was specified in the registry as being suspect (by the
administrator) and the kernel has enabled substantial checking of this driver.
If the driver attempts to corrupt the system, bugchecks 0xC4, 0xC1 and 0xA will
be among the most commonly seen crashes.
Arguments:
Arg1: 0000000000002000, Code Integrity Issue: The caller specified an executable pool type. (Expected: NonPagedPoolNx)
Arg2: fffff8081acc702b, The address in the driver's code where the error was detected.
Arg3: 0000000000000000, Pool Type.
Arg4: 0000000000544545, Pool Tag (if provided).
Debugging Details:
------------------
DUMP_CLASS: 1
DUMP_QUALIFIER: 402
BUILD_VERSION_STRING: 10.0.16299.19 (WinBuild.160101.0800)
SYSTEM_PRODUCT_NAME: To Be Filled By O.E.M.
SYSTEM_SKU: To Be Filled By O.E.M.
SYSTEM_VERSION: To Be Filled By O.E.M.
BIOS_VENDOR: American Megatrends Inc.
BIOS_VERSION: P3.10
BIOS_DATE: 08/25/2017
BASEBOARD_MANUFACTURER: ASRock
BASEBOARD_PRODUCT: X370 Gaming-ITX/ac
BASEBOARD_VERSION:
DUMP_TYPE: 0
BUGCHECK_P1: 2000
BUGCHECK_P2: fffff8081acc702b
BUGCHECK_P3: 0
BUGCHECK_P4: 544545
BUGCHECK_STR: 0xc4_2000
CPU_COUNT: 10
CPU_MHZ: bb2
CPU_VENDOR: AuthenticAMD
CPU_FAMILY: 17
CPU_MODEL: 1
CPU_STEPPING: 1
DEFAULT_BUCKET_ID: WIN8_DRIVER_FAULT
PROCESS_NAME: System
CURRENT_IRQL: 0
ANALYSIS_SESSION_HOST: GIZMOMKIII
ANALYSIS_SESSION_TIME: 11-03-2017 22:20:24.0465
ANALYSIS_VERSION: 10.0.16299.15 amd64fre
LOCK_ADDRESS: fffff800fdd89ec0 -- (!locks fffff800fdd89ec0)
Resource @ nt!PiEngineLock (0xfffff800fdd89ec0) Exclusively owned
Contention Count = 1
NumberOfExclusiveWaiters = 1
Threads: ffffe38b11b79040-01<*>
Threads Waiting On Exclusive Access:
ffffe38b11b88040
1 total locks
PNP_TRIAGE:
Lock address : 0xfffff800fdd89ec0
Thread Count : 1
Thread address: 0xffffe38b11b79040
Thread wait : 0x240
LAST_CONTROL_TRANSFER: from fffff800fe1b5293 to fffff800fdb71960
STACK_TEXT:
ffffe00b`100c99b8 fffff800`fe1b5293 : 00000000`000000c4 00000000`00002000 fffff808`1acc702b 00000000`00000000 : nt!KeBugCheckEx
ffffe00b`100c99c0 fffff800`fdc7d52f : fffff800`fdd5f984 00000000`00002000 fffff808`1acc702b 00000000`00000000 : nt!VerifierBugCheckIfAppropriate+0xdf
ffffe00b`100c9a00 fffff800`fe1ad3cc : 00000000`00544545 fffff800`fdd5f984 fffff808`1acc702b ffffdffc`040cbaf8 : nt!VfReportIssueWithOptions+0x103
ffffe00b`100c9a50 fffff800`fe1ab381 : 00000000`00544545 ffffe00b`100c9b10 00000000`00000000 00000000`00000001 : nt!VfCheckPoolType+0x90
ffffe00b`100c9a90 fffff808`1acc702b : ffffe38b`12ba1380 00000000`00000005 00000000`00411030 ffffe00b`00000001 : nt!VerifierExAllocatePoolEx+0x21
ffffe00b`100c9ae0 fffff808`1acb12ba : 00000000`00000000 ffffe38b`12ba1380 00000000`00000005 fffff808`1943028c : amdpsp+0x1702b
ffffe00b`100c9b20 fffff808`1acb1089 : ffffe38b`12ba1380 00000000`00000000 fffff800`fdd90e30 fffff808`1945c853 : amdpsp+0x12ba
ffffe00b`100c9b50 fffff808`19434913 : ffffe38b`12ba2e78 00000000`000001e0 ffffe00b`100c9c50 ffffe00b`100c9c00 : amdpsp+0x1089
ffffe00b`100c9b80 fffff808`194348ba : ffffe38b`12ba2900 ffff8d80`00c81990 ffffe00b`100c000e ffffe00b`100c9c78 : Wdf01000!FxPnpDeviceD0Entry::InvokeClient+0x23
ffffe00b`100c9be0 fffff808`19436836 : ffffe00b`100c9d50 00000000`00000000 00000000`0000030f 00000000`00000000 : Wdf01000!FxPrePostCallback::InvokeStateful+0x5a
ffffe00b`100c9c20 fffff808`194292c8 : ffffe38b`12ba2950 ffffe38b`12ba2950 00000000`0000030f 00000000`00000000 : Wdf01000!FxPkgPnp:😛owerD0Starting+0x46
ffffe00b`100c9c50 fffff808`19428203 : ffffe38b`12ba2b50 ffffe38b`00000000 ffffe38b`12ba2b28 00000000`00000000 : Wdf01000!FxPkgPnp:😛owerProcessEventInner+0x1f8
ffffe00b`100c9dc0 fffff808`1942f252 : 00000000`00000000 ffffe38b`12ba2900 00000000`00000000 00000000`00000000 : Wdf01000!FxPkgPnp:😛owerProcessEvent+0x143
ffffe00b`100c9e60 fffff808`1942cd2f : ffffe38b`12ba2950 ffffe00b`100c9f90 00000000`00000000 00000000`00000000 : Wdf01000!FxPkgPnp:😛owerPolStarting+0x52
ffffe00b`100c9e90 fffff808`194297fd : ffffe38b`12ba2c28 00001c74`00000000 fffff808`194ac2c0 fffff808`19434800 : Wdf01000!FxPkgPnp:😛owerPolicyProcessEventInner+0x1ff
ffffe00b`100ca000 fffff808`19421042 : 00000000`00000000 ffffe38b`12ba2950 ffffe38b`12ba5b60 ffffe38b`12ba2950 : Wdf01000!FxPkgPnp:😛owerPolicyProcessEvent+0x13d
ffffe00b`100ca0a0 fffff808`1942a451 : ffffe38b`12ba2901 00000000`00000102 ffffe38b`12ba2950 00000000`00000108 : Wdf01000!FxPkgPnp:😛npEventHardwareAvailable+0xb2
ffffe00b`100ca0e0 fffff808`19427fad : ffffe38b`12ba2aa8 fffff808`00000000 ffffe38b`12ba2a80 00000000`00000000 : Wdf01000!FxPkgPnp:😛npProcessEventInner+0x1a1
ffffe00b`100ca190 fffff808`19437dda : 00000000`00000000 00000000`00000000 00000000`00000008 ffffe00b`100ca2c8 : Wdf01000!FxPkgPnp:😛npProcessEvent+0x12d
ffffe00b`100ca230 fffff808`19407d9e : ffffe38b`12ba1090 00000000`00000000 00000000`00000000 ffffe38b`12ba2950 : Wdf01000!FxPkgPnp::_PnpStartDevice+0x4a
ffffe00b`100ca290 fffff808`19407400 : ffff818e`80be6dc0 ffffe38b`12ba1090 ffffe38b`12ba2950 fffff800`fe1c323b : Wdf01000!FxPkgPnp:😀ispatch+0xee
ffffe00b`100ca330 fffff800`fdb2755a : ffffe38b`12ba3860 fffff800`fe1b5610 ffff818e`00000000 ffff818e`00000000 : Wdf01000!FxDevice:😀ispatchWithLock+0x150
ffffe00b`100ca420 fffff800`fe1a9d5d : ffff818e`80be6dc0 ffffe38b`12ba3860 ffffe38b`11be8300 fffff800`fe1b45fc : nt!IopfCallDriver+0x56
ffffe00b`100ca460 fffff800`fdb9fa51 : ffff818e`80be6dc0 00000000`00000000 ffffe38b`12ba5b60 ffffe38b`12c76800 : nt!IovCallDriver+0x275
ffffe00b`100ca4a0 fffff800`fe1c7ec2 : ffff818e`80be6dc0 00000000`00000000 ffffe38b`12ba5b60 00000000`00000000 : nt!IofCallDriver+0x13b771
ffffe00b`100ca4e0 fffff800`fdb2755a : ffffe38b`12ba5cb0 ffff818e`80be6dc0 00000000`00000000 ffffe38b`12ba5b60 : nt!ViFilterDispatchPnp+0x1a2
ffffe00b`100ca520 fffff800`fe1a9d5d : ffff818e`80be6dc0 ffffe38b`12ba5b60 ffffe38b`12dc3840 fffff800`fe1b5b0d : nt!IopfCallDriver+0x56
ffffe00b`100ca560 fffff800`fdb9fa51 : ffff818e`80be6dc0 ffffe00b`100ca6c0 ffffe38b`12ba5b60 ffffe38b`11be8300 : nt!IovCallDriver+0x275
ffffe00b`100ca5a0 fffff800`fde8a9d6 : ffffe38b`0f3f4060 ffffe38b`12dc3840 ffffe00b`100ca630 00000000`00000000 : nt!IofCallDriver+0x13b771
ffffe00b`100ca5e0 fffff800`fda32201 : ffffe38b`0f3f4060 00000000`00000000 ffffe38b`12dc3840 ffffe38b`0f3f6010 : nt!PnpAsynchronousCall+0xea
ffffe00b`100ca620 fffff800`fda32c24 : 00000000`00000000 ffffe38b`0f3f4060 fffff800`fda2f760 ffffcf0b`1d4bf450 : nt!PnpSendIrp+0x91
ffffe00b`100ca690 fffff800`fde6d543 : ffffe38b`0f3f6010 ffffe38b`12dc3840 00000000`00000000 00000000`00000000 : nt!PnpStartDevice+0x88
ffffe00b`100ca720 fffff800`fdf989d3 : ffffe38b`0f3f6010 ffffe00b`100ca8f0 00000000`00000000 ffffe00b`100ca8f0 : nt!PnpStartDeviceNode+0xdb
ffffe00b`100ca7b0 fffff800`fde7fb81 : ffffe38b`0f3f6010 00000000`00000001 00000000`00000002 ffffe38b`0ddefd20 : nt!PipProcessStartPhase1+0x5b
ffffe00b`100ca7f0 fffff800`fdfeb545 : ffffe38b`11bd4160 ffffe00b`100cab19 ffffe38b`11bd4160 ffffe38b`11bd41b0 : nt!PipProcessDevNodeTree+0x42d
ffffe00b`100caa70 fffff800`fdb26014 : ffffe301`00000003 ffffe38b`00000000 ffffe38b`00000000 00000000`00000000 : nt!PiProcessStartSystemDevices+0x59
ffffe00b`100caac0 fffff800`fda68835 : ffffe38b`11b79040 ffffe38b`0cf43b60 fffff800`fdd88940 ffffe38b`0cf43b60 : nt!PnpDeviceActionWorker+0x474
ffffe00b`100cab80 fffff800`fdaf14e7 : ffffa780`5d9c5ec0 00000000`00000080 ffffe38b`0cea1480 ffffe38b`11b79040 : nt!ExpWorkerThread+0xf5
ffffe00b`100cac10 fffff800`fdb76ef6 : ffffa780`5d9b9180 ffffe38b`11b79040 fffff800`fdaf14a0 00000000`00000000 : nt!PspSystemThreadStartup+0x47
ffffe00b`100cac60 00000000`00000000 : ffffe00b`100cb000 ffffe00b`100c5000 00000000`00000000 00000000`00000000 : nt!KiStartSystemThread+0x16
THREAD_SHA1_HASH_MOD_FUNC: 350fbe8e523d781c4121e2748b545cdce07b7ecb
THREAD_SHA1_HASH_MOD_FUNC_OFFSET: a36a93ca6f82fb34b69030e697f401849d6fcf25
THREAD_SHA1_HASH_MOD: fbc29f490326c9a663e974d0f7f05aa4756bc9b3
FOLLOWUP_IP:
amdpsp+1702b
fffff808`1acc702b 488bd8 mov rbx,rax
FAULT_INSTR_CODE: 48d88b48
SYMBOL_STACK_INDEX: 5
SYMBOL_NAME: amdpsp+1702b
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: amdpsp
IMAGE_NAME: amdpsp.sys
DEBUG_FLR_IMAGE_TIMESTAMP: 5935cbec
STACK_COMMAND: .thread ; .cxr ; kb
BUCKET_ID_FUNC_OFFSET: 1702b
FAILURE_BUCKET_ID: 0xc4_2000_VRF_amdpsp!unknown_function
BUCKET_ID: 0xc4_2000_VRF_amdpsp!unknown_function
PRIMARY_PROBLEM_CLASS: 0xc4_2000_VRF_amdpsp!unknown_function
TARGET_TIME: 2017-11-03T21:35:26.000Z
OSBUILD: 16299
OSSERVICEPACK: 19
SERVICEPACK_NUMBER: 0
OS_REVISION: 0
SUITE_MASK: 272
PRODUCT_TYPE: 1
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
OSEDITION: Windows 10 WinNt TerminalServer SingleUserTS
OS_LOCALE:
USER_LCID: 0
OSBUILD_TIMESTAMP: 2017-10-10 06:23:07
BUILDDATESTAMP_STR: 160101.0800
BUILDLAB_STR: WinBuild
BUILDOSVER_STR: 10.0.16299.19
ANALYSIS_SESSION_ELAPSED_TIME: bf3
ANALYSIS_SOURCE: KM
FAILURE_ID_HASH_STRING: km:0xc4_2000_vrf_amdpsp!unknown_function
FAILURE_ID_HASH: {b97f9f3d-1133-776b-9b84-d5446f5bf532}
Followup: MachineOwner