Looking for help with BSOD

  • Thread starter Thread starter serenfng
  • Start date Start date
S

serenfng

Guest
This is brand new machine. I am getting very skippy/lagging behavior with high DPC via LatencyMon. I occassionally get BSODs. There is no overlcocking.


AMD Ryzen 3600

MSI Tomahawk x570

HyperX 64gb 32 x 2 RAM

EVGA 1650 Super

Samsung 980 NVME

Seasonic Prime Titanium


Microsoft (R) Windows Debugger Version 10.0.20153.1000 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.


Loading Dump File [C:\Windows\MEMORY.DMP]
Kernel Bitmap Dump File: Kernel address space is available, User address space may not be available.


************* Path validation summary **************
Response Time (ms) Location
Deferred srv*
Symbol search path is: srv*
Executable search path is:
Windows 10 Kernel Version 19041 MP (12 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS
Edition build lab: 19041.1.amd64fre.vb_release.191206-1406
Machine Name:
Kernel base = 0xfffff803`56406000 PsLoadedModuleList = 0xfffff803`570303b0
Debug session time: Fri Nov 13 04:59:10.699 2020 (UTC - 6:00)
System Uptime: 0 days 7:55:37.376
Loading Kernel Symbols
...............................................................
......Page c8430 not present in the dump file. Type ".hh dbgerr004" for details
.......Page c855a not present in the dump file. Type ".hh dbgerr004" for details
...................................................
..............................................................
Loading User Symbols
PEB is paged out (Peb.Ldr = 00000086`a2e68018). Type ".hh dbgerr001" for details
Loading unloaded module list
.......
For analysis of this file, run
!analyze -v
nt!KeBugCheckEx:
fffff803`567fb210 48894c2408 mov qword ptr [rsp+8],rcx ss:0018:ffff8086`aec61170=000000000000001a
5: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************

MEMORY_MANAGEMENT (1a)
# Any other values for parameter 1 must be individually examined.
Arguments:
Arg1: 0000000000005308, The subtype of the bugcheck.
Arg2: ffff9940c23ac9b0
Arg3: fffffffff00003e0
Arg4: 0000000000000000

Debugging Details:
------------------


KEY_VALUES_STRING: 1

Key : Analysis.CPU.mSec
Value: 2593

Key : Analysis.DebugAnalysisProvider.CPP
Value: Create: 8007007e on DESKTOP-N5HPJGV

Key : Analysis.DebugData
Value: CreateObject

Key : Analysis.DebugModel
Value: CreateObject

Key : Analysis.Elapsed.mSec
Value: 2585

Key : Analysis.Memory.CommitPeak.Mb
Value: 83

Key : Analysis.System
Value: CreateObject

Key : WER.OS.Branch
Value: vb_release

Key : WER.OS.Timestamp
Value: 2019-12-06T14:06:00Z

Key : WER.OS.Version
Value: 10.0.19041.1


ADDITIONAL_XML: 1

OS_BUILD_LAYERS: 1

BUGCHECK_CODE: 1a

BUGCHECK_P1: 5308

BUGCHECK_P2: ffff9940c23ac9b0

BUGCHECK_P3: fffffffff00003e0

BUGCHECK_P4: 0

PROCESS_NAME: chrome.exe

STACK_TEXT:
ffff8086`aec61168 fffff803`5687d583 : 00000000`0000001a 00000000`00005308 ffff9940`c23ac9b0 ffffffff`f00003e0 : nt!KeBugCheckEx
ffff8086`aec61170 fffff803`5662c19a : ffff8184`75936000 ffff9900`00000000 ffff8086`aec61260 00000000`00000000 : nt!MiLinkPoolCommitChain+0x177723
ffff8086`aec611d0 fffff803`5662c017 : 00000000`00000000 00000000`00001000 00000000`00000000 00000000`00000000 : nt!MiCommitPoolMemory+0xfe
ffff8086`aec61220 fffff803`5662be54 : 00000000`00001000 ffff8086`aec61320 00000000`00000004 00000000`00000004 : nt!MmAllocatePoolMemory+0xcf
ffff8086`aec612e0 fffff803`5662bca5 : ffff8184`75936000 ffff8086`aec61448 00000000`00001000 00000000`00000001 : nt!RtlpHpEnvAllocVA+0xc8
ffff8086`aec61350 fffff803`5662b605 : ffff8184`7cdd4f68 ffff8086`aec615d8 00000000`00000000 fffff803`56dc87b6 : nt!RtlpHpAllocVA+0xf5
ffff8086`aec61410 fffff803`5662b39e : 00000000`00000000 00000000`00000001 00000000`00000000 00000000`00000001 : nt!RtlpHpSegMgrCommit+0xf5
ffff8086`aec614e0 fffff803`5662a7fb : 00000000`00000001 ffff8184`759006c0 00000001`00000000 00000001`00000001 : nt!RtlpHpSegPageRangeCommit+0x1ee
ffff8086`aec61580 fffff803`569b95e9 : 00000000`00000000 00000000`00001000 00000000`000001a8 00000000`00001000 : nt!RtlpHpSegAlloc+0xab
ffff8086`aec615e0 fffff803`5686dfa0 : 00000000`00000004 00000000`00000000 ffff9a81`00000000 ffff8086`aec5c000 : nt!ExAllocateHeapSpecialPool+0x9d
ffff8086`aec61680 fffff803`566d064f : ffff8086`aec62000 00000000`00000000 00000000`2b707249 00000000`00000000 : nt!ExAllocateHeapPool+0x19d920
ffff8086`aec617c0 fffff803`566d05c0 : 00000000`00000028 00000000`2b707249 00000000`000001a8 fffff803`00000000 : nt!ExpAllocatePoolWithTagFromNode+0x5f
ffff8086`aec61810 fffff803`56dd779d : 00000000`00000280 00000000`00000028 00000000`00000000 00000000`000001a8 : nt!ExAllocatePoolWithTagPriority+0x70
ffff8086`aec61850 fffff803`56dd47af : 00000000`00000000 ffff8086`aec61b03 ffff8184`2b707249 ffff8184`5a028080 : nt!VeAllocatePoolWithTagPriority+0x1cd
ffff8086`aec618c0 fffff803`56dc780e : 00000000`00000000 ffff8086`aec61b03 ffff8184`5a028080 ffff8184`5a028098 : nt!ViIrpAllocateLockedPacket+0x5f
ffff8086`aec61910 fffff803`5686f315 : 00000000`00000000 ffff8086`aec61b80 00000086`a780eaa0 ffff8184`7a084c10 : nt!IovAllocateIrp+0x5e
ffff8086`aec61960 fffff803`56abed51 : ffffb089`00000000 ffff8086`aec61b80 00000086`a780eaa0 ffff8184`7a084c10 : nt!IopAllocateIrpExReturn+0x19bc25
ffff8086`aec61990 fffff803`5680cbb8 : 00000000`00000000 00000000`00000000 00000000`00000000 000001f2`863a8440 : nt!NtWriteFile+0x541
ffff8086`aec61a90 00007ffe`c660bea4 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x28
00000086`a780ea28 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffe`c660bea4


SYMBOL_NAME: nt!MiLinkPoolCommitChain+177723

MODULE_NAME:
nt

STACK_COMMAND: .thread ; .cxr ; kb

IMAGE_NAME: ntkrnlmp.exe

BUCKET_ID_FUNC_OFFSET: 177723

FAILURE_BUCKET_ID: 0x1a_5308_VRF_nt!MiLinkPoolCommitChain

OS_VERSION: 10.0.19041.1

BUILDLAB_STR: vb_release

OSPLATFORM_TYPE: x64

OSNAME: Windows 10

FAILURE_ID_HASH: {ea9c1b03-eefe-a505-32a7-0e2c7f23c40f}

Followup: MachineOwner
---------



Continue reading...
 
Back
Top