So I just 2 days ago developed an almost constant memory management BSOD. My pc has never been prone to issues, is showroom clean inside and is built with quality parts throughout. Has always run flawlessly. But 2 days ago, after about 4 hours of gaming, I was simply browsing amazon and I got the BSOD siting memory management stop code. it rebooted and then started BSODing every time it tried to boot up windows and would get into a BSOD loop with every BSOD being the same stopcode. This is constant. I can sometimes get windows to fire up if I keep restarting the pc over and over. and when it starts I can get it to even run games. I tried stress testing it and no BSOD, but if I restart or shut down my PC, its about a 90% chance it will BSOD upon starting back up. Below I am listing everything I have tried so far as well as the dump file text. Also of note, I have not added any new hardware or software to my PC in quite a while and I keep my windows, GPU, antivirus etc up to date.
What I have tried:
Other interesting things of note:
Here is the dump file contents:
Microsoft (R) Windows Debugger Version 10.0.20153.1000 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [C:\WINDOWS\MEMORY.DMP]
Kernel Bitmap Dump File: Full address space is available
Symbol search path is: srv*
Executable search path is:
Windows 10 Kernel Version 18362 MP (4 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS Personal
Edition build lab: 18362.1.amd64fre.19h1_release.190318-1202
Machine Name:
Kernel base = 0xfffff807
Debug session time: Wed Feb 24 09:51:44.176 2021 (UTC - 6:00)
System Uptime: 0 days 0:00:20.858
Loading Kernel Symbols
...............................................................
................................................................
................................................................
...................
Loading User Symbols
Loading unloaded module list
......
For analysis of this file, run !analyze -v
nt!KeBugCheckEx:
fffff807
0: kd> !analyze -v
***
MEMORY_MANAGEMENT (1a)
# Any other values for parameter 1 must be individually examined.
Arguments:
Arg1: 0000000000001240, The subtype of the bugcheck.
Arg2: ffffbe0c151572f0
Arg3: ffff8954c3feefd0
Arg4: 0000200000000080
Debugging Details:
------------------
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 4156
Key : Analysis.DebugAnalysisProvider.CPP
Value: Create: 8007007e on DESKTOP-6IKHTSC
Key : Analysis.DebugData
Value: CreateObject
Key : Analysis.DebugModel
Value: CreateObject
Key : Analysis.Elapsed.mSec
Value: 4154
Key : Analysis.Memory.CommitPeak.Mb
Value: 79
Key : Analysis.System
Value: CreateObject
Key : WER.OS.Branch
Value: 19h1_release
Key : WER.OS.Timestamp
Value: 2019-03-18T12:02:00Z
Key : WER.OS.Version
Value: 10.0.18362.1
ADDITIONAL_XML: 1
OS_BUILD_LAYERS: 1
BUGCHECK_CODE: 1a
BUGCHECK_P1: 1240
BUGCHECK_P2: ffffbe0c151572f0
BUGCHECK_P3: ffff8954c3feefd0
BUGCHECK_P4: 200000000080
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXWINLOGON: 1
PROCESS_NAME: aswidsagent.exe
LOCK_ADDRESS: fffff80708a60a00 -- (!locks fffff80708a60a00)
Resource @ nt!PiEngineLock (0xfffff80708a60a00) Exclusively owned
Contention Count = 18
NumberOfExclusiveWaiters = 1
Threads: ffffbe0c0f157040-01<*>
Threads Waiting On Exclusive Access:
ffffbe0c0f60b040
1 total locks
PNP_TRIAGE_DATA:
Lock address : 0xfffff80708a60a00
Thread Count : 1
Thread address: 0xffffbe0c0f157040
Thread wait : 0x536
STACK_TEXT:
fffffa05
fffffa05
fffffa05
fffffa05
fffffa05
fffffa05
fffffa05
fffffa05
fffffa05
fffffa05
fffffa05
fffffa05
fffffa05
fffffa05
fffffa05
fffffa05
fffffa05
fffffa05
fffffa05
fffffa05
fffffa05
fffffa05
fffffa05
fffffa05
fffffa05
fffffa05
fffffa05
fffffa05
fffffa05
fffffa05
fffffa05
fffffa05
fffffa05
fffffa05
fffffa05
fffffa05
fffffa05
fffffa05
fffffa05
SYMBOL_NAME: vsflt53+1638d
MODULE_NAME: vsflt53
IMAGE_NAME: vsflt53.sys
STACK_COMMAND: .thread ; .cxr ; kb
BUCKET_ID_FUNC_OFFSET: 1638d
FAILURE_BUCKET_ID: 0x1a_1240_vsflt53!unknown_function
OS_VERSION: 10.0.18362.1
BUILDLAB_STR: 19h1_release
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {5ea660ab-7d46-79bc-889e-2be6f6839cc1}
Followup: MachineOwner
---------
What I have tried:
- Sfc scan
- Windows memory diagnostic (said no errors)
- Memtest86 (did 1 pass, said no errors)
- Reseated RAM
- Removed RAM modules (have 4) one at a time to see if one of them being removed would resolve the BSOD, it BSOD'd each time, so no change there
- Reverted last windows update (no change)
- Reapplied last windows update (no change)
- Turned off virtual memory and told it not to make a page file, restarted, then turned it back on (no change)
- Pushed and held the DRAM OK button on the motherboard during a startup
- Bios and windows are both seeing my full 12GB of memory
Other interesting things of note:
- If I have all 4 sticks of RAM in, it BSODs 100% of the time. If I remove 1 stick (any 1 stick) it has a 30%-ish chance of starting up and running.
- Once it actually gets into windows, the pc runs fine. isn't sluggish or anything
Here is the dump file contents:
Microsoft (R) Windows Debugger Version 10.0.20153.1000 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [C:\WINDOWS\MEMORY.DMP]
Kernel Bitmap Dump File: Full address space is available
Symbol search path is: srv*
Executable search path is:
Windows 10 Kernel Version 18362 MP (4 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS Personal
Edition build lab: 18362.1.amd64fre.19h1_release.190318-1202
Machine Name:
Kernel base = 0xfffff807
08600000 PsLoadedModuleList = 0xfffff807
08a461b0Debug session time: Wed Feb 24 09:51:44.176 2021 (UTC - 6:00)
System Uptime: 0 days 0:00:20.858
Loading Kernel Symbols
...............................................................
................................................................
................................................................
...................
Loading User Symbols
Loading unloaded module list
......
For analysis of this file, run !analyze -v
nt!KeBugCheckEx:
fffff807
087c3b20 48894c2408 mov qword ptr [rsp+8],rcx ss:0018:fffffa05
66786d10=000000000000001a0: kd> !analyze -v
***
- *
- Bugcheck Analysis *
- *
MEMORY_MANAGEMENT (1a)
# Any other values for parameter 1 must be individually examined.
Arguments:
Arg1: 0000000000001240, The subtype of the bugcheck.
Arg2: ffffbe0c151572f0
Arg3: ffff8954c3feefd0
Arg4: 0000200000000080
Debugging Details:
------------------
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 4156
Key : Analysis.DebugAnalysisProvider.CPP
Value: Create: 8007007e on DESKTOP-6IKHTSC
Key : Analysis.DebugData
Value: CreateObject
Key : Analysis.DebugModel
Value: CreateObject
Key : Analysis.Elapsed.mSec
Value: 4154
Key : Analysis.Memory.CommitPeak.Mb
Value: 79
Key : Analysis.System
Value: CreateObject
Key : WER.OS.Branch
Value: 19h1_release
Key : WER.OS.Timestamp
Value: 2019-03-18T12:02:00Z
Key : WER.OS.Version
Value: 10.0.18362.1
ADDITIONAL_XML: 1
OS_BUILD_LAYERS: 1
BUGCHECK_CODE: 1a
BUGCHECK_P1: 1240
BUGCHECK_P2: ffffbe0c151572f0
BUGCHECK_P3: ffff8954c3feefd0
BUGCHECK_P4: 200000000080
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXWINLOGON: 1
PROCESS_NAME: aswidsagent.exe
LOCK_ADDRESS: fffff80708a60a00 -- (!locks fffff80708a60a00)
Resource @ nt!PiEngineLock (0xfffff80708a60a00) Exclusively owned
Contention Count = 18
NumberOfExclusiveWaiters = 1
Threads: ffffbe0c0f157040-01<*>
Threads Waiting On Exclusive Access:
ffffbe0c0f60b040
1 total locks
PNP_TRIAGE_DATA:
Lock address : 0xfffff80708a60a00
Thread Count : 1
Thread address: 0xffffbe0c0f157040
Thread wait : 0x536
STACK_TEXT:
fffffa05
66786d08 fffff807
0884146e : 000000000000001a 00000000
00001240 ffffbe0c151572f0 ffff8954
c3feefd0 : nt!KeBugCheckExfffffa05
66786d10 fffff807
0c4e638d : ffffa987fddfa000 00000000
00000000 ffff8954c3feefd8 00000000
00000000 : nt!MmBuildMdlForNonPagedPool+0x1472fefffffa05
66786dc0 fffff807
0c4e2ce7 : ffffbe0c16666000 fffffa05
66786ef0 0000000000000200 00000000
000000c0 : vsflt53+0x1638dfffffa05
66786e80 fffff807
0c4d5fe7 : 0000000000000000 ffffa987
fddfa000 0000000000000001 ffffbe0c
0d3ff920 : vsflt53+0x12ce7fffffa05
66786ec0 fffff807
0c4d6bb1 : ffffbe0c16666170 00000000
00000000 0000000000000001 ffffbe0c
0d3ff920 : vsflt53+0x5fe7fffffa05
66786f90 fffff807
0c4d84bc : ffffbe0c11c24210 ffffbe0c
16666010 ffffbe0c0d3dd280 00000000
00000000 : vsflt53+0x6bb1fffffa05
66786fe0 fffff807
0c4d7ff4 : ffffbe0c11c24210 ffffbe0c
16666010 ffffbe0c0d3dd280 00000000
00000000 : vsflt53+0x84bcfffffa05
66787020 fffff807
0c4dfd26 : 0000000000000001 00000000
c00000bb ffffbe0c11c24210 00000000
60000001 : vsflt53+0x7ff4fffffa05
667870a0 fffff807
0c4dfaf4 : ffffbe0c11c24210 ffffbe0c
11c24210 ffffbe0c11c24210 ffffbe0c
0d3dd280 : vsflt53+0xfd26fffffa05
667870d0 fffff807
0c4e0936 : fffffa0566787158 00000000
00000000 fffff8070c4d1ef0 ffffbe0c
0d3dd280 : vsflt53+0xfaf4fffffa05
66787100 fffff807
0c4df9a1 : ffffbe0c152b7e20 00000000
00005150 ffffbe0c0d3dd280 ffffbe0c
11c24210 : vsflt53+0x10936fffffa05
66787130 fffff807
0c4dc4f2 : ffffbe0c152b7e20 fffffa05
66787370 ffffbe0c16666010 ffffbe0c
152b7f70 : vsflt53+0xf9a1fffffa05
66787170 fffff807
08637159 : fffff80708600000 fffff807
08638ba6 ffffffffffffffff ffffbe0c
16666010 : vsflt53+0xc4f2fffffa05
667871a0 fffff807
0d591a67 : fffff8070896f468 fffff807
08bbe8c5 ffffffff0000ffff 00000000
00000000 : nt!IofCallDriver+0x59fffffa05
667871e0 fffff807
0d5a2399 : ffffbe0c169d5370 ffffbe0c
16666010 ffffa987f2faf170 ffffa987
f2faf170 : CLASSPNP!ClassSendIrpSynchronous+0x67fffffa05
66787240 fffff807
0d5d87f0 : ffffbe0c169d5370 00000000
00010000 00000000c0000002 00000000
00000005 : CLASSPNP!ClassForwardIrpSynchronous+0x39fffffa05
66787270 fffff807
0d5917c3 : ffffa987f2800340 00000000
000000ff ffffbe0c16666010 00000000
00000000 : CLASSPNP!ClassDispatchPnp+0x390fffffa05
667873f0 fffff807
08637159 : fffffa05667876c0 00000000
00000053 0000000000000103 00000000
00000000 : CLASSPNP!ClassGlobalDispatch+0x23fffffa05
66787420 fffff807
0872a64e : 0000000000000001 00000000
00000000 0000000000000000 fffffa05
667876c0 : nt!IofCallDriver+0x59fffffa05
66787460 fffff807
08cd4fe1 : 0000000000000000 00000000
00000005 0000000000000000 fffffa05
667876c0 : nt!IoSynchronousCallDriver+0x4efffffa05
667874c0 fffff807
0c569721 : ffffa987fc73ede0 00000000
00000000 ffffa987fc73ed60 fffff807
0896e0a9 : nt!IoForwardIrpSynchronously+0x41fffffa05
667874f0 fffff807
0c57b620 : ffffbe0c16666010 ffffbe0c
166661b8 ffffbe0c16666010 ffff3911
7139c97c : partmgr!PmStartDevice+0x75fffffa05
667875c0 fffff807
0c561eef : ffffbe0c16666010 ffffbe0c
169d5d60 ffffbe0c16666200 00000000
000000ff : partmgr!PmPnp+0x120fffffa05
66787610 fffff807
08637159 : ffffa98700000000 00000000
00000000 fffff80708cf9fa0 fffff807
08d06d56 : partmgr!PmGlobalDispatch+0x1ffffffa05
66787640 fffff807
0d66131d : fffffa05667876c0 fffff807
08977760 fffffa05667876e8 fffffa05
66787718 : nt!IofCallDriver+0x59fffffa05
66787680 fffff807
0d661228 : ffffbe0c169d5c10 ffffbe0c
16666010 0000000000000000 00000000
00000000 : aswArDisk+0x131dfffffa05
667876f0 fffff807
08637159 : ffffbe0c169d5c10 ffffbe0c
16666010 ffffbe0c16666010 fffffa05
66787860 : aswArDisk+0x1228fffffa05
66787740 fffff807
08d18e46 : ffffbe0c1698d060 ffffbe0c
15ac1e40 0000000000000000 00000000
00000000 : nt!IofCallDriver+0x59fffffa05
66787780 fffff807
0869983a : ffffbe0c1698d060 00000000
00000000 ffffbe0c15ac1e40 fffff807
00000000 : nt!PnpAsynchronousCall+0xeafffffa05
667877c0 fffff807
0875898c : 0000000000000000 ffffbe0c
1698d060 fffff807087454c0 fffff807
087454c0 : nt!PnpSendIrp+0x5efffffa05
66787830 fffff807
08d18128 : 0000000000000000 00000000
00000000 ffffbe0c15ac1e40 00000000
00000000 : nt!PnpStartDevice+0x88fffffa05
667878c0 fffff807
08d17ff7 : ffffbe0c1698c890 00000000
00000000 0000000000000001 fffff807
08745946 : nt!PnpStartDeviceNode+0xecfffffa05
66787950 fffff807
08d02a1c : ffffbe0c1698c890 fffffa05
66787a18 0000000000000002 00000000
00000001 : nt!PipProcessStartPhase1+0x6ffffffa05
667879a0 fffff807
08d200bc : ffffbe0c13fd2d00 fffff807
0863ee01 fffffa0566787ab0 fffff807
00000002 : nt!PipProcessDevNodeTree+0x3b0fffffa05
66787a60 fffff807
0875d747 : 0000000100000003 ffffbe0c
15807cb0 ffffbe0c13fd2d80 ffffbe0c
13fd2d80 : nt!PiProcessReenumeration+0x88fffffa05
66787ab0 fffff807
08659d35 : ffffbe0c0f157040 ffffbe0c
0d887cb0 fffff80708a5f2c0 ffffbe0c
0d887cb0 : nt!PnpDeviceActionWorker+0x207fffffa05
66787b70 fffff807
08733585 : ffffbe0c0f157040 00000000
00000080 ffffbe0c0d871040 00000405
b59bbfff : nt!ExpWorkerThread+0x105fffffa05
66787c10 fffff807
087cb128 : ffffd08195d62180 ffffbe0c
0f157040 fffff80708733530 00000000
00000014 : nt!PspSystemThreadStartup+0x55fffffa05
66787c60 00000000
00000000 : fffffa0566788000 fffffa05
66782000 0000000000000000 00000000
00000000 : nt!KiStartSystemThread+0x28SYMBOL_NAME: vsflt53+1638d
MODULE_NAME: vsflt53
IMAGE_NAME: vsflt53.sys
STACK_COMMAND: .thread ; .cxr ; kb
BUCKET_ID_FUNC_OFFSET: 1638d
FAILURE_BUCKET_ID: 0x1a_1240_vsflt53!unknown_function
OS_VERSION: 10.0.18362.1
BUILDLAB_STR: 19h1_release
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {5ea660ab-7d46-79bc-889e-2be6f6839cc1}
Followup: MachineOwner
---------