AnsweredAssumed Answered

BSOD since update to Ryzen 3600

Question asked by sevven on Aug 2, 2019

Hello,

Two weeks froom now, I have update my pc with:

-Processors:Ryzen 5 3600

-Motherboard :TUF Gaming B450-PLUS

-RAM: DDR4 HyperX Fury, Noir, 16 Go (2 x 8 Go), 3200 MHz, CAS 18https://www.topachat.com/pages/detail2_cat_est_micro_puis_rubrique_est_wme_ddr4_puis_ref_est_in10111488.html

 

And I kept my  GTX 1060 6Gb

 

But with this update, after reinstallling windws multiple times, I still got some BSOD

 

On Fri 02/08/2019 11:57:42 GMT your computer crashed
crash dump file: C:\Windows\Minidump\080219-121359-01.dmp
This was probably caused by the following module: ntkrnlmp.exe (nt!KeBugCheckEx+0x0)
Bugcheck code: 0xA (0x23F28F593E9, 0xFF, 0x0, 0xFFFFF807318C7777)
Error: IRQL_NOT_LESS_OR_EQUAL
Bug check description: This indicates that Microsoft Windows or a kernel-mode driver accessed paged memory at DISPATCH_LEVEL or above.
This appears to be a typical software driver bug and is not likely to be caused by a hardware problem.
The crash took place in the Windows kernel. Possibly this problem is caused by another driver that cannot be identified at this time.



On Fri 02/08/2019 11:57:42 GMT your computer crashed
crash dump file: C:\Windows\memory.dmp
This was probably caused by the following module: ntkrnlmp.exe (nt!KeBugCheckEx+0x0)
Bugcheck code: 0xA (0x23F28F593E9, 0xFF, 0x0, 0xFFFFF807318C7777)
Error: IRQL_NOT_LESS_OR_EQUAL
Bug check description: This indicates that Microsoft Windows or a kernel-mode driver accessed paged memory at DISPATCH_LEVEL or above.
This appears to be a typical software driver bug and is not likely to be caused by a hardware problem.
The crash took place in the Windows kernel. Possibly this problem is caused by another driver that cannot be identified at this time.



On Mon 29/07/2019 18:42:49 GMT your computer crashed
crash dump file: C:\Windows\Minidump\072919-17156-01.dmp
This was probably caused by the following module: ntkrnlmp.exe (nt!KeBugCheckEx+0x0)
Bugcheck code: 0xC1 (0xFFFFCA06AF9E2FF0, 0xFFFFCA06AF9E2B70, 0x5F4008, 0x23)
Error: SPECIAL_POOL_DETECTED_MEMORY_CORRUPTION
Bug check description: This indicates that the driver wrote to an invalid section of the special pool.
This appears to be a typical software driver bug and is not likely to be caused by a hardware problem.
The crash took place in the Windows kernel. Possibly this problem is caused by another driver that cannot be identified at this time.

 

 

I have the last BIOS for my Motherboard, I have iinstalled last drivers from AMD site foor my Motherboard ( B450 Drivers & Support | AMD ) and I even have Ryzen master.

And for most of the times, people says that the error can come from drivers or memory. I have run memetest 86 for a night, and the test didn't get any errors.
So I dont think it's the material, but a drivers compatbility problem?

 

 

I will c/p the details of the dmp here:

 

for the crash of monday:

Debugging Details:
------------------


KEY_VALUES_STRING: 1


PROCESSES_ANALYSIS: 1

SERVICE_ANALYSIS: 1

STACKHASH_ANALYSIS: 1

TIMELINE_ANALYSIS: 1


DUMP_CLASS: 1

DUMP_QUALIFIER: 401

BUILD_VERSION_STRING:  18362.1.amd64fre.19h1_release.190318-1202

SYSTEM_MANUFACTURER:  System manufacturer

SYSTEM_PRODUCT_NAME:  System Product Name

SYSTEM_SKU:  SKU

SYSTEM_VERSION:  System Version

BIOS_VENDOR:  American Megatrends Inc.

BIOS_VERSION:  1607

BIOS_DATE:  06/17/2019

BASEBOARD_MANUFACTURER:  ASUSTeK COMPUTER INC.

BASEBOARD_PRODUCT:  TUF B450-PLUS GAMING

BASEBOARD_VERSION:  Rev X.0x

DUMP_TYPE:  1

BUGCHECK_P1: 23f28f593e9

BUGCHECK_P2: ff

BUGCHECK_P3: 0

BUGCHECK_P4: fffff807318c7777

READ_ADDRESS:  0000023f28f593e9

CURRENT_IRQL:  0

FAULTING_IP:
nt!PpmIdleExecuteTransition+1a7
fffff807`318c7777 498b5c2408      mov     rbx,qword ptr [r12+8]

CPU_COUNT: c

CPU_MHZ: e09

CPU_VENDOR:  AuthenticAMD

CPU_FAMILY: 17

CPU_MODEL: 71

CPU_STEPPING: 0

DEFAULT_BUCKET_ID:  WIN8_DRIVER_FAULT

BUGCHECK_STR:  AV

PROCESS_NAME:  System

ANALYSIS_SESSION_HOST:  DESKTOP-P2RUIMA

ANALYSIS_SESSION_TIME:  08-02-2019 14:59:06.0864

ANALYSIS_VERSION: 10.0.18362.1 amd64fre

TRAP_FRAME:  ffffa7055c461650 -- (.trap 0xffffa7055c461650)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=ffffb58b1b0c07f0 rbx=0000000000000000 rcx=ffffa7055c4618a8
rdx=0000000000000000 rsi=0000000000000000 rdi=0000000000000000
rip=fffff807318c7777 rsp=ffffa7055c4617e0 rbp=ffffb58b1b0c02d0
 r8=0000000000000001  r9=0000000000000007 r10=ffffb58b1b0c03c8
r11=0000000000000002 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0         nv up di pl zr na po nc
nt!PpmIdleExecuteTransition+0x1a7:
fffff807`318c7777 498b5c2408      mov     rbx,qword ptr [r12+8] ds:00000000`00000008=????????????????
Resetting default scope

LAST_CONTROL_TRANSFER:  from fffff80731a746e9 to fffff80731a62900

STACK_TEXT:  
ffffa705`5c461508 fffff807`31a746e9 : 00000000`0000000a 0000023f`28f593e9 00000000`000000ff 00000000`00000000 : nt!KeBugCheckEx
ffffa705`5c461510 fffff807`31a70a2b : 00000000`00140001 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiBugCheckDispatch+0x69
ffffa705`5c461650 fffff807`318c7777 : ffffb58b`1b0c0300 ffffb58b`1b0c02d0 00000000`00000000 00000000`00000000 : nt!KiPageFault+0x46b
ffffa705`5c4617e0 fffff807`318c742e : 00000000`00000003 00000000`00000002 ffffb58b`1b0c03c0 00000000`00000008 : nt!PpmIdleExecuteTransition+0x1a7
ffffa705`5c461b00 fffff807`31a66388 : ffffffff`00000000 ffffd600`a4723180 ffffb58b`44c0c700 00000000`00000924 : nt!PoIdle+0x36e
ffffa705`5c461c60 00000000`00000000 : ffffa705`5c462000 ffffa705`5c45c000 00000000`00000000 00000000`00000000 : nt!KiIdleLoop+0x48


THREAD_SHA1_HASH_MOD_FUNC:  fbc86847fe4eb6c3c1fac4537ef130091fd9343a

THREAD_SHA1_HASH_MOD_FUNC_OFFSET:  126af671633ed496d1f6ce5ca3b576f7735bc4ab

THREAD_SHA1_HASH_MOD:  ee8fcf1fb60cb6e3e2f60ddbed2ec02b5748a693

FOLLOWUP_IP:
nt!PpmIdleExecuteTransition+1a7
fffff807`318c7777 498b5c2408      mov     rbx,qword ptr [r12+8]

FAULT_INSTR_CODE:  245c8b49

SYMBOL_STACK_INDEX:  3

SYMBOL_NAME:  nt!PpmIdleExecuteTransition+1a7

FOLLOWUP_NAME:  MachineOwner

MODULE_NAME: nt

IMAGE_NAME:  ntkrnlmp.exe

DEBUG_FLR_IMAGE_TIMESTAMP:  3ed0f42

STACK_COMMAND:  .thread ; .cxr ; kb

BUCKET_ID_FUNC_OFFSET:  1a7

FAILURE_BUCKET_ID:  AV_VRFK_nt!PpmIdleExecuteTransition

BUCKET_ID:  AV_VRFK_nt!PpmIdleExecuteTransition

PRIMARY_PROBLEM_CLASS:  AV_VRFK_nt!PpmIdleExecuteTransition

TARGET_TIME:  2019-08-02T11:57:42.000Z

OSBUILD:  18362

OSSERVICEPACK:  0

SERVICEPACK_NUMBER: 0

OS_REVISION: 0

SUITE_MASK:  272

PRODUCT_TYPE:  1

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

OSEDITION:  Windows 10 WinNt TerminalServer SingleUserTS

OS_LOCALE:  

USER_LCID:  0

OSBUILD_TIMESTAMP:  1972-02-02 09:33:06

BUILDDATESTAMP_STR:  190318-1202

BUILDLAB_STR:  19h1_release

BUILDOSVER_STR:  10.0.18362.1.amd64fre.19h1_release.190318-1202

ANALYSIS_SESSION_ELAPSED_TIME:  14fb

ANALYSIS_SOURCE:  KM

FAILURE_ID_HASH_STRING:  km:av_vrfk_nt!ppmidleexecutetransition

FAILURE_ID_HASH:  {11ec9791-f3e3-88b4-d570-fb594c3cfd9b}

Followup:     MachineOwner

 

for today crash:

*** WARNING: Unable to verify timestamp for win32k.sys

KEY_VALUES_STRING: 1


PROCESSES_ANALYSIS: 1

SERVICE_ANALYSIS: 1

STACKHASH_ANALYSIS: 1

TIMELINE_ANALYSIS: 1


DUMP_CLASS: 1

DUMP_QUALIFIER: 400

BUILD_VERSION_STRING:  18362.1.amd64fre.19h1_release.190318-1202

DUMP_TYPE:  2

BUGCHECK_P1: 23f28f593e9

BUGCHECK_P2: ff

BUGCHECK_P3: 0

BUGCHECK_P4: fffff807318c7777

READ_ADDRESS: fffff80731e143b0: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
 0000023f28f593e9

CURRENT_IRQL:  0

FAULTING_IP:
nt!PpmIdleExecuteTransition+1a7
fffff807`318c7777 498b5c2408      mov     rbx,qword ptr [r12+8]

CPU_COUNT: c

CPU_MHZ: e09

CPU_VENDOR:  AuthenticAMD

CPU_FAMILY: 17

CPU_MODEL: 71

CPU_STEPPING: 0

CUSTOMER_CRASH_COUNT:  1

DEFAULT_BUCKET_ID:  VERIFIER_ENABLED_VISTA_MINIDUMP

BUGCHECK_STR:  AV

PROCESS_NAME:  System

ANALYSIS_SESSION_HOST:  DESKTOP-P2RUIMA

ANALYSIS_SESSION_TIME:  08-02-2019 15:00:43.0053

ANALYSIS_VERSION: 10.0.18362.1 amd64fre

TRAP_FRAME:  ffffa7055c461650 -- (.trap 0xffffa7055c461650)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=ffffb58b1b0c07f0 rbx=0000000000000000 rcx=ffffa7055c4618a8
rdx=0000000000000000 rsi=0000000000000000 rdi=0000000000000000
rip=fffff807318c7777 rsp=ffffa7055c4617e0 rbp=ffffb58b1b0c02d0
 r8=0000000000000001  r9=0000000000000007 r10=ffffb58b1b0c03c8
r11=0000000000000002 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0         nv up di pl zr na po nc
nt!PpmIdleExecuteTransition+0x1a7:
fffff807`318c7777 498b5c2408      mov     rbx,qword ptr [r12+8] ds:00000000`00000008=????????????????
Resetting default scope

LAST_CONTROL_TRANSFER:  from fffff80731a746e9 to fffff80731a62900

STACK_TEXT:  
ffffa705`5c461508 fffff807`31a746e9 : 00000000`0000000a 0000023f`28f593e9 00000000`000000ff 00000000`00000000 : nt!KeBugCheckEx
ffffa705`5c461510 fffff807`31a70a2b : 00000000`00140001 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiBugCheckDispatch+0x69
ffffa705`5c461650 fffff807`318c7777 : ffffb58b`1b0c0300 ffffb58b`1b0c02d0 00000000`00000000 00000000`00000000 : nt!KiPageFault+0x46b
ffffa705`5c4617e0 fffff807`318c742e : 00000000`00000003 00000000`00000002 ffffb58b`1b0c03c0 00000000`00000008 : nt!PpmIdleExecuteTransition+0x1a7
ffffa705`5c461b00 fffff807`31a66388 : ffffffff`00000000 ffffd600`a4723180 ffffb58b`44c0c700 00000000`00000924 : nt!PoIdle+0x36e
ffffa705`5c461c60 00000000`00000000 : ffffa705`5c462000 ffffa705`5c45c000 00000000`00000000 00000000`00000000 : nt!KiIdleLoop+0x48


THREAD_SHA1_HASH_MOD_FUNC:  fbc86847fe4eb6c3c1fac4537ef130091fd9343a

THREAD_SHA1_HASH_MOD_FUNC_OFFSET:  126af671633ed496d1f6ce5ca3b576f7735bc4ab

THREAD_SHA1_HASH_MOD:  ee8fcf1fb60cb6e3e2f60ddbed2ec02b5748a693

FOLLOWUP_IP:
nt!PpmIdleExecuteTransition+1a7
fffff807`318c7777 498b5c2408      mov     rbx,qword ptr [r12+8]

FAULT_INSTR_CODE:  245c8b49

SYMBOL_STACK_INDEX:  3

SYMBOL_NAME:  nt!PpmIdleExecuteTransition+1a7

FOLLOWUP_NAME:  MachineOwner

MODULE_NAME: nt

IMAGE_NAME:  ntkrnlmp.exe

DEBUG_FLR_IMAGE_TIMESTAMP:  3ed0f42

IMAGE_VERSION:  10.0.18362.239

STACK_COMMAND:  .thread ; .cxr ; kb

BUCKET_ID_FUNC_OFFSET:  1a7

FAILURE_BUCKET_ID:  AV_VRFK_nt!PpmIdleExecuteTransition

BUCKET_ID:  AV_VRFK_nt!PpmIdleExecuteTransition

PRIMARY_PROBLEM_CLASS:  AV_VRFK_nt!PpmIdleExecuteTransition

TARGET_TIME:  2019-08-02T11:57:42.000Z

OSBUILD:  18362

OSSERVICEPACK:  239

SERVICEPACK_NUMBER: 0

OS_REVISION: 0

SUITE_MASK:  272

PRODUCT_TYPE:  1

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

OSEDITION:  Windows 10 WinNt TerminalServer SingleUserTS

OS_LOCALE:  

USER_LCID:  0

OSBUILD_TIMESTAMP:  1972-02-02 09:33:06

BUILDDATESTAMP_STR:  190318-1202

BUILDLAB_STR:  19h1_release

BUILDOSVER_STR:  10.0.18362.1.amd64fre.19h1_release.190318-1202

ANALYSIS_SESSION_ELAPSED_TIME:  2196

ANALYSIS_SOURCE:  KM

FAILURE_ID_HASH_STRING:  km:av_vrfk_nt!ppmidleexecutetransition

FAILURE_ID_HASH:  {11ec9791-f3e3-88b4-d570-fb594c3cfd9b}

Followup:     MachineOwner
---------

Outcomes