F
Fernando708
System Information:
Windows 10 Education
Version: 10.0.19042 Build 19042
Ryzen 5 2600
Asus B350-F Gaming Motherboard
16GB Ram
RX 580 8GB GPU
Intel 545 500GB SSD
________________________________________________
Hi, recently. I have been having constant black screens. My monitor will randomly go black and go back to normal. Other times, my monitor would go black and completely restart. I have also had GPU driver crashes (event 4101). I have updated my GPU drivers, clean installed windows, DDU the drivers, and even RMA'd the GPU and installed a new one. I am still having the same problem, which leads me to believe that it's possibly not the GPU. I have a crash dump from a few days ago. I also ran a memory test using windows and everything came out ok. This has been going on for months and I have no idea what it could be... Any help would be appreciated.
________________________________________________
ATTEMPTED_WRITE_TO_READONLY_MEMORY (be)
An attempt was made to write to readonly memory. The guilty driver is on the
stack trace (and is typically the current instruction pointer).
When possible, the guilty driver's name (Unicode string) is printed on
the bugcheck screen and saved in KiBugCheckDriver.
Arguments:
Arg1: ffff9b9666936698, Virtual address for the attempted write.
Arg2: 8a00000000200121, PTE contents.
Arg3: fffff889e253ed30, (reserved)
Arg4: 000000000000000a, (reserved)
Debugging Details:
------------------
*** WARNING: Unable to verify checksum for win32k.sys
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 3921
Key : Analysis.DebugAnalysisProvider.CPP
Value: Create: 8007007e on FERNANDO-DESKTO
Key : Analysis.DebugData
Value: CreateObject
Key : Analysis.DebugModel
Value: CreateObject
Key : Analysis.Elapsed.mSec
Value: 12265
Key : Analysis.Memory.CommitPeak.Mb
Value: 94
Key : Analysis.System
Value: CreateObject
Key : WER.OS.Branch
Value: vb_release
Key : WER.OS.Timestamp
Value: 2019-12-06T14:06:00Z
Key : WER.OS.Version
Value: 10.0.19041.1
ADDITIONAL_XML: 1
OS_BUILD_LAYERS: 1
BUGCHECK_CODE: be
BUGCHECK_P1: ffff9b9666936698
BUGCHECK_P2: 8a00000000200121
BUGCHECK_P3: fffff889e253ed30
BUGCHECK_P4: a
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXPNP: 1 (!blackboxpnp)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: System
BAD_PAGES_DETECTED: d
TRAP_FRAME: fffff889e253ed30 -- (.trap 0xfffff889e253ed30)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=ffffb3ffffffffff rbx=0000000000000000 rcx=0000000000000004
rdx=3fffffffffffffff rsi=0000000000000000 rdi=0000000000000000
rip=fffff80108f4dc46 rsp=fffff889e253eec0 rbp=0000000000000001
r8=ffffb38000000000 r9=ffffb3ffffffffff r10=0000007ffffffff8
r11=ffffb679c9400000 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei pl zr na po nc
nt!MiClearPteAccessed+0x156:
fffff801`08f4dc46 f0480fba6b183f lock bts qword ptr [rbx+18h],3Fh ds:00000000`00000018=????????????????
Resetting default scope
STACK_TEXT:
fffff889`e253eb38 fffff801`0904126c : 00000000`000000be ffff9b96`66936698 8a000000`00200121 fffff889`e253ed30 : nt!KeBugCheckEx
fffff889`e253eb40 fffff801`08eea58f : 8a000000`00200121 00000000`00000003 fffff889`e253edb0 00000000`00000000 : nt!MiRaisedIrqlFault+0x1bf460
fffff889`e253eb90 fffff801`0900335e : fffff889`e253f4b8 fffff801`08e699da ffff8385`4c4a6998 ffff9a00`00000008 : nt!MmAccessFault+0x4ef
fffff889`e253ed30 fffff801`08f4dc46 : 1a000000`003ba863 1a000000`003ba863 00000000`00000000 fffff801`08e726bf : nt!KiPageFault+0x35e
fffff889`e253eec0 fffff801`08f4d865 : fffff801`0984f000 ffff8385`4184b090 ffff9a00`00000000 ffffc680`9f590f38 : nt!MiClearPteAccessed+0x156
fffff889`e253ef40 fffff801`08f4d64f : fffff889`e253f560 ffffb3fc`00865540 ffff9b96`66936680 00000000`00000000 : nt!MiAgePteWorker+0x1e5
fffff889`e253efa0 fffff801`08ee9526 : fffff889`e253f560 ffffb3fc`00865540 00000000`00000000 87778777`86778677 : nt!MiAgePte+0x51f
fffff889`e253f040 fffff801`08ee963b : ffffb3d9`00000000 fffff801`0984f000 00000000`00000000 fffff889`e253f5b0 : nt!MiWalkPageTablesRecursively+0x776
fffff889`e253f0e0 fffff801`08ee963b : ffffb3d9`ecff0020 fffff801`0984f000 00000000`00000001 fffff889`e253f5c0 : nt!MiWalkPageTablesRecursively+0x88b
fffff889`e253f180 fffff801`08ee963b : ffffb3d9`ecff0000 fffff801`0984f000 00000000`00000002 fffff889`e253f5d0 : nt!MiWalkPageTablesRecursively+0x88b
fffff889`e253f220 fffff801`08ed859b : 00000000`00000000 fffff801`0984f000 fffff889`00000003 fffff889`e253f5e0 : nt!MiWalkPageTablesRecursively+0x88b
fffff889`e253f2c0 fffff801`08ed8031 : fffff889`e253f560 00000000`00000000 00000000`00000001 00000000`00000000 : nt!MiWalkPageTables+0x36b
fffff889`e253f3c0 fffff801`08ed7739 : 00000000`00000000 00000000`00000000 ffffc680`a05571c0 00000000`00000000 : nt!MiAgeWorkingSet+0x3d1
fffff889`e253f8d0 fffff801`08ed6f47 : 00000000`00000000 fffff889`e253fa80 fffff889`e253fa40 00000000`00000000 : nt!MiTrimOrAgeWorkingSet+0x3c9
fffff889`e253f9c0 fffff801`08e08e60 : fffff801`09850c00 fffff889`e253fa80 00000000`00000bba ffffc680`00000204 : nt!MiProcessWorkingSets+0x227
fffff889`e253fa60 fffff801`08fb4847 : 00000000`00000007 00000000`00000007 00000000`ffffffff ffffc680`9f58e180 : nt!MiWorkingSetManager+0x110
fffff889`e253fb20 fffff801`08ea29a5 : ffff8385`41924080 00000000`00000080 fffff801`08fb46f0 ffffffff`ffffffff : nt!KeBalanceSetManager+0x157
fffff889`e253fc10 fffff801`08ffc868 : ffffc680`9f58e180 ffff8385`41924080 fffff801`08ea2950 ffffffff`ffffffff : nt!PspSystemThreadStartup+0x55
fffff889`e253fc60 00000000`00000000 : fffff889`e2540000 fffff889`e253a000 00000000`00000000 00000000`00000000 : nt!KiStartSystemThread+0x28
SYMBOL_NAME: PAGE_NOT_ZERO
MODULE_NAME: Unknown_Module
IMAGE_NAME: Unknown_Image
STACK_COMMAND: .thread ; .cxr ; kb
FAILURE_BUCKET_ID: PAGE_NOT_ZERO_0xBE
OS_VERSION: 10.0.19041.1
BUILDLAB_STR: vb_release
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {8bd1dd76-32f7-299f-3278-fe93ae5dfccf}
Followup: MachineOwner
---------
*** Memory manager detected 13 instance(s) of page corruption, target is likely to have memory corruption.
Continue reading...
Windows 10 Education
Version: 10.0.19042 Build 19042
Ryzen 5 2600
Asus B350-F Gaming Motherboard
16GB Ram
RX 580 8GB GPU
Intel 545 500GB SSD
________________________________________________
Hi, recently. I have been having constant black screens. My monitor will randomly go black and go back to normal. Other times, my monitor would go black and completely restart. I have also had GPU driver crashes (event 4101). I have updated my GPU drivers, clean installed windows, DDU the drivers, and even RMA'd the GPU and installed a new one. I am still having the same problem, which leads me to believe that it's possibly not the GPU. I have a crash dump from a few days ago. I also ran a memory test using windows and everything came out ok. This has been going on for months and I have no idea what it could be... Any help would be appreciated.
________________________________________________
ATTEMPTED_WRITE_TO_READONLY_MEMORY (be)
An attempt was made to write to readonly memory. The guilty driver is on the
stack trace (and is typically the current instruction pointer).
When possible, the guilty driver's name (Unicode string) is printed on
the bugcheck screen and saved in KiBugCheckDriver.
Arguments:
Arg1: ffff9b9666936698, Virtual address for the attempted write.
Arg2: 8a00000000200121, PTE contents.
Arg3: fffff889e253ed30, (reserved)
Arg4: 000000000000000a, (reserved)
Debugging Details:
------------------
*** WARNING: Unable to verify checksum for win32k.sys
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 3921
Key : Analysis.DebugAnalysisProvider.CPP
Value: Create: 8007007e on FERNANDO-DESKTO
Key : Analysis.DebugData
Value: CreateObject
Key : Analysis.DebugModel
Value: CreateObject
Key : Analysis.Elapsed.mSec
Value: 12265
Key : Analysis.Memory.CommitPeak.Mb
Value: 94
Key : Analysis.System
Value: CreateObject
Key : WER.OS.Branch
Value: vb_release
Key : WER.OS.Timestamp
Value: 2019-12-06T14:06:00Z
Key : WER.OS.Version
Value: 10.0.19041.1
ADDITIONAL_XML: 1
OS_BUILD_LAYERS: 1
BUGCHECK_CODE: be
BUGCHECK_P1: ffff9b9666936698
BUGCHECK_P2: 8a00000000200121
BUGCHECK_P3: fffff889e253ed30
BUGCHECK_P4: a
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXPNP: 1 (!blackboxpnp)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: System
BAD_PAGES_DETECTED: d
TRAP_FRAME: fffff889e253ed30 -- (.trap 0xfffff889e253ed30)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=ffffb3ffffffffff rbx=0000000000000000 rcx=0000000000000004
rdx=3fffffffffffffff rsi=0000000000000000 rdi=0000000000000000
rip=fffff80108f4dc46 rsp=fffff889e253eec0 rbp=0000000000000001
r8=ffffb38000000000 r9=ffffb3ffffffffff r10=0000007ffffffff8
r11=ffffb679c9400000 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei pl zr na po nc
nt!MiClearPteAccessed+0x156:
fffff801`08f4dc46 f0480fba6b183f lock bts qword ptr [rbx+18h],3Fh ds:00000000`00000018=????????????????
Resetting default scope
STACK_TEXT:
fffff889`e253eb38 fffff801`0904126c : 00000000`000000be ffff9b96`66936698 8a000000`00200121 fffff889`e253ed30 : nt!KeBugCheckEx
fffff889`e253eb40 fffff801`08eea58f : 8a000000`00200121 00000000`00000003 fffff889`e253edb0 00000000`00000000 : nt!MiRaisedIrqlFault+0x1bf460
fffff889`e253eb90 fffff801`0900335e : fffff889`e253f4b8 fffff801`08e699da ffff8385`4c4a6998 ffff9a00`00000008 : nt!MmAccessFault+0x4ef
fffff889`e253ed30 fffff801`08f4dc46 : 1a000000`003ba863 1a000000`003ba863 00000000`00000000 fffff801`08e726bf : nt!KiPageFault+0x35e
fffff889`e253eec0 fffff801`08f4d865 : fffff801`0984f000 ffff8385`4184b090 ffff9a00`00000000 ffffc680`9f590f38 : nt!MiClearPteAccessed+0x156
fffff889`e253ef40 fffff801`08f4d64f : fffff889`e253f560 ffffb3fc`00865540 ffff9b96`66936680 00000000`00000000 : nt!MiAgePteWorker+0x1e5
fffff889`e253efa0 fffff801`08ee9526 : fffff889`e253f560 ffffb3fc`00865540 00000000`00000000 87778777`86778677 : nt!MiAgePte+0x51f
fffff889`e253f040 fffff801`08ee963b : ffffb3d9`00000000 fffff801`0984f000 00000000`00000000 fffff889`e253f5b0 : nt!MiWalkPageTablesRecursively+0x776
fffff889`e253f0e0 fffff801`08ee963b : ffffb3d9`ecff0020 fffff801`0984f000 00000000`00000001 fffff889`e253f5c0 : nt!MiWalkPageTablesRecursively+0x88b
fffff889`e253f180 fffff801`08ee963b : ffffb3d9`ecff0000 fffff801`0984f000 00000000`00000002 fffff889`e253f5d0 : nt!MiWalkPageTablesRecursively+0x88b
fffff889`e253f220 fffff801`08ed859b : 00000000`00000000 fffff801`0984f000 fffff889`00000003 fffff889`e253f5e0 : nt!MiWalkPageTablesRecursively+0x88b
fffff889`e253f2c0 fffff801`08ed8031 : fffff889`e253f560 00000000`00000000 00000000`00000001 00000000`00000000 : nt!MiWalkPageTables+0x36b
fffff889`e253f3c0 fffff801`08ed7739 : 00000000`00000000 00000000`00000000 ffffc680`a05571c0 00000000`00000000 : nt!MiAgeWorkingSet+0x3d1
fffff889`e253f8d0 fffff801`08ed6f47 : 00000000`00000000 fffff889`e253fa80 fffff889`e253fa40 00000000`00000000 : nt!MiTrimOrAgeWorkingSet+0x3c9
fffff889`e253f9c0 fffff801`08e08e60 : fffff801`09850c00 fffff889`e253fa80 00000000`00000bba ffffc680`00000204 : nt!MiProcessWorkingSets+0x227
fffff889`e253fa60 fffff801`08fb4847 : 00000000`00000007 00000000`00000007 00000000`ffffffff ffffc680`9f58e180 : nt!MiWorkingSetManager+0x110
fffff889`e253fb20 fffff801`08ea29a5 : ffff8385`41924080 00000000`00000080 fffff801`08fb46f0 ffffffff`ffffffff : nt!KeBalanceSetManager+0x157
fffff889`e253fc10 fffff801`08ffc868 : ffffc680`9f58e180 ffff8385`41924080 fffff801`08ea2950 ffffffff`ffffffff : nt!PspSystemThreadStartup+0x55
fffff889`e253fc60 00000000`00000000 : fffff889`e2540000 fffff889`e253a000 00000000`00000000 00000000`00000000 : nt!KiStartSystemThread+0x28
SYMBOL_NAME: PAGE_NOT_ZERO
MODULE_NAME: Unknown_Module
IMAGE_NAME: Unknown_Image
STACK_COMMAND: .thread ; .cxr ; kb
FAILURE_BUCKET_ID: PAGE_NOT_ZERO_0xBE
OS_VERSION: 10.0.19041.1
BUILDLAB_STR: vb_release
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {8bd1dd76-32f7-299f-3278-fe93ae5dfccf}
Followup: MachineOwner
---------
*** Memory manager detected 13 instance(s) of page corruption, target is likely to have memory corruption.
Continue reading...