V
VSCoder
My computer will run into BSOD almost always after continual running 7 days. I am wondering which part could cause this problem? Software or hardware? I saw that the problem could be caused by memory so I reinstalled my memory and verified it is correctly installed but the problem still pops up again. Here are the memory dump file analysis by windbg.exe for reference. Thanks!
Update: here is the minidump file 052220-11968-01.dmp
I also had other two BSODs before. I also post here for reference.
Update 2: I also had my memory tested under Windows Memory Diagnostic but no problems were found.
Microsoft (R) Windows Debugger Version 10.0.18362.1 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [C:\Windows\MEMORY.DMP]
Kernel Bitmap Dump File: Kernel address space is available, User address space may not be available.
************* Path validation summary **************
Response Time (ms) Location
Deferred SRV*C:\Symbols*Symbol information
Symbol search path is: SRV*C:\Symbols*Symbol information
Executable search path is:
Windows 10 Kernel Version 18362 MP (24 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS
Built by: 18362.1.amd64fre.19h1_release.190318-1202
Machine Name:
Kernel base = 0xfffff800`52c00000 PsLoadedModuleList = 0xfffff800`53048170
Debug session time: Fri May 22 07:18:20.595 2020 (UTC - 4:00)
System Uptime: 0 days 20:01:35.269
Loading Kernel Symbols
...............................................................
................................................................
...............................................................
Loading User Symbols
PEB is paged out (Peb.Ldr = 00000065`31483018). Type ".hh dbgerr001" for details
Loading unloaded module list
.......
For analysis of this file, run !analyze -v
9: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
PAGE_FAULT_IN_NONPAGED_AREA (50)
Invalid system memory was referenced. This cannot be protected by try-except.
Typically the address is just plain bad or it is pointing at freed memory.
Arguments:
Arg1: ffff8109a4967c08, memory referenced.
Arg2: 0000000000000000, value 0 = read operation, 1 = write operation.
Arg3: fffff800532b411b, If non-zero, the instruction address which referenced the bad memory
address.
Arg4: 0000000000000002, (reserved)
Debugging Details:
------------------
KEY_VALUES_STRING: 1
PROCESSES_ANALYSIS: 1
SERVICE_ANALYSIS: 1
STACKHASH_ANALYSIS: 1
TIMELINE_ANALYSIS: 1
DUMP_CLASS: 1
DUMP_QUALIFIER: 401
BUILD_VERSION_STRING: 18362.1.amd64fre.19h1_release.190318-1202
SYSTEM_MANUFACTURER: System manufacturer
SYSTEM_PRODUCT_NAME: System Product Name
SYSTEM_SKU: SKU
SYSTEM_VERSION: System Version
BIOS_VENDOR: American Megatrends Inc.
BIOS_VERSION: 1302
BIOS_DATE: 01/20/2020
BASEBOARD_MANUFACTURER: ASUSTeK COMPUTER INC.
BASEBOARD_PRODUCT: ROG CROSSHAIR VIII HERO (WI-FI)
BASEBOARD_VERSION: Rev X.0x
DUMP_TYPE: 1
BUGCHECK_P1: ffff8109a4967c08
BUGCHECK_P2: 0
BUGCHECK_P3: fffff800532b411b
BUGCHECK_P4: 2
READ_ADDRESS: ffff8109a4967c08
FAULTING_IP:
nt!ObpCreateHandle+87b
fffff800`532b411b 488b4608 mov rax,qword ptr [rsi+8]
MM_INTERNAL_CODE: 2
CPU_COUNT: 18
CPU_MHZ: ed1
CPU_VENDOR: AuthenticAMD
CPU_FAMILY: 17
CPU_MODEL: 71
CPU_STEPPING: 0
DEFAULT_BUCKET_ID: WIN8_DRIVER_FAULT
BUGCHECK_STR: AV
PROCESS_NAME: MsMpEng.exe
CURRENT_IRQL: 0
ANALYSIS_SESSION_HOST: DESKTOP-UK5AERM
ANALYSIS_SESSION_TIME: 05-22-2020 10:36:51.0393
ANALYSIS_VERSION: 10.0.18362.1 amd64fre
TRAP_FRAME: ffff9388df8ed140 -- (.trap 0xffff9388df8ed140)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=ffffa80c04b7e080 rbx=0000000000000000 rcx=0000000000000000
rdx=0000000000000000 rsi=0000000000000000 rdi=0000000000000000
rip=fffff800532b411b rsp=ffff9388df8ed2d0 rbp=ffff9388df8ed3f0
r8=0000000000000000 r9=0000000000000000 r10=0000000000000001
r11=ffff9388df8ed840 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei ng nz na po cy
nt!ObpCreateHandle+0x87b:
fffff800`532b411b 488b4608 mov rax,qword ptr [rsi+8] ds:00000000`00000008=????????????????
Resetting default scope
LAST_CONTROL_TRANSFER: from fffff80052e2dd34 to fffff80052dc2390
STACK_TEXT:
ffff9388`df8ece98 fffff800`52e2dd34 : 00000000`00000050 ffff8109`a4967c08 00000000`00000000 ffff9388`df8ed140 : nt!KeBugCheckEx
ffff9388`df8ecea0 fffff800`52cc91af : a80c04e7`0090fffe 00000000`00000000 00000000`00000000 ffff8109`a4967c08 : nt!MiSystemFault+0x195c94
ffff9388`df8ecfa0 fffff800`52dd041e : 00000000`00000000 00000000`df8ed840 00000000`00000000 ffffa80c`04e700a0 : nt!MmAccessFault+0x34f
ffff9388`df8ed140 fffff800`532b411b : ffff9388`df8ed3f0 00000000`00000001 00000000`00000000 ffff8109`a4967c20 : nt!KiPageFault+0x35e
ffff9388`df8ed2d0 fffff800`532aa75c : ffff9388`df8ed820 ffffa80c`04e64080 00000000`00000000 00000000`00000000 : nt!ObpCreateHandle+0x87b
ffff9388`df8ed500 fffff800`5329d78e : ffffa80c`04b7e080 ffff9388`df8edb80 00000000`00000000 00000000`00000000 : nt!ObOpenObjectByPointer+0xec
ffff9388`df8ed760 fffff800`5329d573 : 00000065`336fd528 00000000`00000066 00000000`00000000 00000000`000003e3 : nt!PsOpenThread+0x20e
ffff9388`df8edac0 fffff800`52dd3c18 : ffffa80c`04b7e080 ffff9388`00000000 ffff9388`df8edb80 00000222`08707890 : nt!NtOpenThread+0x23
ffff9388`df8edb00 00007ffb`df3de584 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x28
00000065`336fd0a8 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffb`df3de584
THREAD_SHA1_HASH_MOD_FUNC: e7308cb5b2bce3259fcb2a2d82b2a4ae62d0edb9
THREAD_SHA1_HASH_MOD_FUNC_OFFSET: 6e415a18470408776de4bd4e59a14db327878c3e
THREAD_SHA1_HASH_MOD: 9f457f347057f10e1df248e166a3e95e6570ecfe
FOLLOWUP_IP:
nt!ObpCreateHandle+87b
fffff800`532b411b 488b4608 mov rax,qword ptr [rsi+8]
FAULT_INSTR_CODE: 8468b48
SYMBOL_STACK_INDEX: 4
SYMBOL_NAME: nt!ObpCreateHandle+87b
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: nt
IMAGE_NAME: ntkrnlmp.exe
DEBUG_FLR_IMAGE_TIMESTAMP: 0
STACK_COMMAND: .thread ; .cxr ; kb
BUCKET_ID_FUNC_OFFSET: 87b
FAILURE_BUCKET_ID: AV_R_INVALID_nt!ObpCreateHandle
BUCKET_ID: AV_R_INVALID_nt!ObpCreateHandle
PRIMARY_PROBLEM_CLASS: AV_R_INVALID_nt!ObpCreateHandle
TARGET_TIME: 2020-05-22T11:18:20.000Z
OSBUILD: 18362
OSSERVICEPACK: 0
SERVICEPACK_NUMBER: 0
OS_REVISION: 0
SUITE_MASK: 272
PRODUCT_TYPE: 1
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
OSEDITION: Windows 10 WinNt TerminalServer SingleUserTS
OS_LOCALE:
USER_LCID: 0
OSBUILD_TIMESTAMP: unknown_date
BUILDDATESTAMP_STR: 190318-1202
BUILDLAB_STR: 19h1_release
BUILDOSVER_STR: 10.0.18362.1.amd64fre.19h1_release.190318-1202
ANALYSIS_SESSION_ELAPSED_TIME: 25e4
ANALYSIS_SOURCE: KM
FAILURE_ID_HASH_STRING: km:av_r_invalid_nt!obpcreatehandle
FAILURE_ID_HASH: {27f6cfdc-4604-91eb-121d-57c0a4aaf233}
Followup: MachineOwner
---------
Continue reading...
Update: here is the minidump file 052220-11968-01.dmp
I also had other two BSODs before. I also post here for reference.
Update 2: I also had my memory tested under Windows Memory Diagnostic but no problems were found.
Microsoft (R) Windows Debugger Version 10.0.18362.1 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [C:\Windows\MEMORY.DMP]
Kernel Bitmap Dump File: Kernel address space is available, User address space may not be available.
************* Path validation summary **************
Response Time (ms) Location
Deferred SRV*C:\Symbols*Symbol information
Symbol search path is: SRV*C:\Symbols*Symbol information
Executable search path is:
Windows 10 Kernel Version 18362 MP (24 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS
Built by: 18362.1.amd64fre.19h1_release.190318-1202
Machine Name:
Kernel base = 0xfffff800`52c00000 PsLoadedModuleList = 0xfffff800`53048170
Debug session time: Fri May 22 07:18:20.595 2020 (UTC - 4:00)
System Uptime: 0 days 20:01:35.269
Loading Kernel Symbols
...............................................................
................................................................
...............................................................
Loading User Symbols
PEB is paged out (Peb.Ldr = 00000065`31483018). Type ".hh dbgerr001" for details
Loading unloaded module list
.......
For analysis of this file, run !analyze -v
9: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
PAGE_FAULT_IN_NONPAGED_AREA (50)
Invalid system memory was referenced. This cannot be protected by try-except.
Typically the address is just plain bad or it is pointing at freed memory.
Arguments:
Arg1: ffff8109a4967c08, memory referenced.
Arg2: 0000000000000000, value 0 = read operation, 1 = write operation.
Arg3: fffff800532b411b, If non-zero, the instruction address which referenced the bad memory
address.
Arg4: 0000000000000002, (reserved)
Debugging Details:
------------------
KEY_VALUES_STRING: 1
PROCESSES_ANALYSIS: 1
SERVICE_ANALYSIS: 1
STACKHASH_ANALYSIS: 1
TIMELINE_ANALYSIS: 1
DUMP_CLASS: 1
DUMP_QUALIFIER: 401
BUILD_VERSION_STRING: 18362.1.amd64fre.19h1_release.190318-1202
SYSTEM_MANUFACTURER: System manufacturer
SYSTEM_PRODUCT_NAME: System Product Name
SYSTEM_SKU: SKU
SYSTEM_VERSION: System Version
BIOS_VENDOR: American Megatrends Inc.
BIOS_VERSION: 1302
BIOS_DATE: 01/20/2020
BASEBOARD_MANUFACTURER: ASUSTeK COMPUTER INC.
BASEBOARD_PRODUCT: ROG CROSSHAIR VIII HERO (WI-FI)
BASEBOARD_VERSION: Rev X.0x
DUMP_TYPE: 1
BUGCHECK_P1: ffff8109a4967c08
BUGCHECK_P2: 0
BUGCHECK_P3: fffff800532b411b
BUGCHECK_P4: 2
READ_ADDRESS: ffff8109a4967c08
FAULTING_IP:
nt!ObpCreateHandle+87b
fffff800`532b411b 488b4608 mov rax,qword ptr [rsi+8]
MM_INTERNAL_CODE: 2
CPU_COUNT: 18
CPU_MHZ: ed1
CPU_VENDOR: AuthenticAMD
CPU_FAMILY: 17
CPU_MODEL: 71
CPU_STEPPING: 0
DEFAULT_BUCKET_ID: WIN8_DRIVER_FAULT
BUGCHECK_STR: AV
PROCESS_NAME: MsMpEng.exe
CURRENT_IRQL: 0
ANALYSIS_SESSION_HOST: DESKTOP-UK5AERM
ANALYSIS_SESSION_TIME: 05-22-2020 10:36:51.0393
ANALYSIS_VERSION: 10.0.18362.1 amd64fre
TRAP_FRAME: ffff9388df8ed140 -- (.trap 0xffff9388df8ed140)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=ffffa80c04b7e080 rbx=0000000000000000 rcx=0000000000000000
rdx=0000000000000000 rsi=0000000000000000 rdi=0000000000000000
rip=fffff800532b411b rsp=ffff9388df8ed2d0 rbp=ffff9388df8ed3f0
r8=0000000000000000 r9=0000000000000000 r10=0000000000000001
r11=ffff9388df8ed840 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei ng nz na po cy
nt!ObpCreateHandle+0x87b:
fffff800`532b411b 488b4608 mov rax,qword ptr [rsi+8] ds:00000000`00000008=????????????????
Resetting default scope
LAST_CONTROL_TRANSFER: from fffff80052e2dd34 to fffff80052dc2390
STACK_TEXT:
ffff9388`df8ece98 fffff800`52e2dd34 : 00000000`00000050 ffff8109`a4967c08 00000000`00000000 ffff9388`df8ed140 : nt!KeBugCheckEx
ffff9388`df8ecea0 fffff800`52cc91af : a80c04e7`0090fffe 00000000`00000000 00000000`00000000 ffff8109`a4967c08 : nt!MiSystemFault+0x195c94
ffff9388`df8ecfa0 fffff800`52dd041e : 00000000`00000000 00000000`df8ed840 00000000`00000000 ffffa80c`04e700a0 : nt!MmAccessFault+0x34f
ffff9388`df8ed140 fffff800`532b411b : ffff9388`df8ed3f0 00000000`00000001 00000000`00000000 ffff8109`a4967c20 : nt!KiPageFault+0x35e
ffff9388`df8ed2d0 fffff800`532aa75c : ffff9388`df8ed820 ffffa80c`04e64080 00000000`00000000 00000000`00000000 : nt!ObpCreateHandle+0x87b
ffff9388`df8ed500 fffff800`5329d78e : ffffa80c`04b7e080 ffff9388`df8edb80 00000000`00000000 00000000`00000000 : nt!ObOpenObjectByPointer+0xec
ffff9388`df8ed760 fffff800`5329d573 : 00000065`336fd528 00000000`00000066 00000000`00000000 00000000`000003e3 : nt!PsOpenThread+0x20e
ffff9388`df8edac0 fffff800`52dd3c18 : ffffa80c`04b7e080 ffff9388`00000000 ffff9388`df8edb80 00000222`08707890 : nt!NtOpenThread+0x23
ffff9388`df8edb00 00007ffb`df3de584 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x28
00000065`336fd0a8 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffb`df3de584
THREAD_SHA1_HASH_MOD_FUNC: e7308cb5b2bce3259fcb2a2d82b2a4ae62d0edb9
THREAD_SHA1_HASH_MOD_FUNC_OFFSET: 6e415a18470408776de4bd4e59a14db327878c3e
THREAD_SHA1_HASH_MOD: 9f457f347057f10e1df248e166a3e95e6570ecfe
FOLLOWUP_IP:
nt!ObpCreateHandle+87b
fffff800`532b411b 488b4608 mov rax,qword ptr [rsi+8]
FAULT_INSTR_CODE: 8468b48
SYMBOL_STACK_INDEX: 4
SYMBOL_NAME: nt!ObpCreateHandle+87b
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: nt
IMAGE_NAME: ntkrnlmp.exe
DEBUG_FLR_IMAGE_TIMESTAMP: 0
STACK_COMMAND: .thread ; .cxr ; kb
BUCKET_ID_FUNC_OFFSET: 87b
FAILURE_BUCKET_ID: AV_R_INVALID_nt!ObpCreateHandle
BUCKET_ID: AV_R_INVALID_nt!ObpCreateHandle
PRIMARY_PROBLEM_CLASS: AV_R_INVALID_nt!ObpCreateHandle
TARGET_TIME: 2020-05-22T11:18:20.000Z
OSBUILD: 18362
OSSERVICEPACK: 0
SERVICEPACK_NUMBER: 0
OS_REVISION: 0
SUITE_MASK: 272
PRODUCT_TYPE: 1
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
OSEDITION: Windows 10 WinNt TerminalServer SingleUserTS
OS_LOCALE:
USER_LCID: 0
OSBUILD_TIMESTAMP: unknown_date
BUILDDATESTAMP_STR: 190318-1202
BUILDLAB_STR: 19h1_release
BUILDOSVER_STR: 10.0.18362.1.amd64fre.19h1_release.190318-1202
ANALYSIS_SESSION_ELAPSED_TIME: 25e4
ANALYSIS_SOURCE: KM
FAILURE_ID_HASH_STRING: km:av_r_invalid_nt!obpcreatehandle
FAILURE_ID_HASH: {27f6cfdc-4604-91eb-121d-57c0a4aaf233}
Followup: MachineOwner
---------
Continue reading...