Question blue screen with fault page error.

Aug 9, 2020
2
0
10
0
so i built this computer for my brother a while ago and it gets blue screen error fault page the most. sometimes it runs fine but all the steam games gets event id 1000 after running for awhile. I've swap out all parts so far except the CPU.
I also have dump files. This is the latest one.

Microsoft (R) Windows Debugger Version 10.0.20153.1000 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.


Loading Dump File [C:\Windows\Minidump\080820-4468-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available

Symbol search path is: srv*
Executable search path is:
Windows 10 Kernel Version 19041 MP (12 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS Personal
Edition build lab: 19041.1.amd64fre.vb_release.191206-1406
Machine Name:
Kernel base = 0xfffff80653600000 PsLoadedModuleList = 0xfffff8065422a310
Debug session time: Sat Aug 8 17:36:13.773 2020 (UTC - 5:00)
System Uptime: 0 days 0:01:27.383
Loading Kernel Symbols
...............................................................
................................................................
.....................................................
Loading User Symbols
Loading unloaded module list
........
For analysis of this file, run !analyze -v
nt!KeBugCheckEx:
fffff806539ddb60 48894c2408 mov qword ptr [rsp+8],rcx ss:0018:ffff8c812267d2f0=0000000000000050
10: kd> !analyze -v
***
  • *
  • Bugcheck Analysis *
  • *
***

PAGE_FAULT_IN_NONPAGED_AREA (50)
Invalid system memory was referenced. This cannot be protected by try-except.
Typically the address is just plain bad or it is pointing at freed memory.
Arguments:
Arg1: ffffac87dbf57068, memory referenced.
Arg2: 0000000000000000, value 0 = read operation, 1 = write operation.
Arg3: fffff80653bf9171, If non-zero, the instruction address which referenced the bad memory
address.
Arg4: 0000000000000002, (reserved)

Debugging Details:
------------------


Could not read faulting driver name

KEY_VALUES_STRING: 1

Key : Analysis.CPU.mSec
Value: 3890

Key : Analysis.DebugAnalysisProvider.CPP
Value: Create: 8007007e on DESKTOP-SOFF5B2

Key : Analysis.DebugData
Value: CreateObject

Key : Analysis.DebugModel
Value: CreateObject

Key : Analysis.Elapsed.mSec
Value: 13675

Key : Analysis.Memory.CommitPeak.Mb
Value: 77

Key : Analysis.System
Value: CreateObject

Key : WER.OS.Branch
Value: vb_release

Key : WER.OS.Timestamp
Value: 2019-12-06T14:06:00Z

Key : WER.OS.Version
Value: 10.0.19041.1


ADDITIONAL_XML: 1

OS_BUILD_LAYERS: 1

BUGCHECK_CODE: 50

BUGCHECK_P1: ffffac87dbf57068

BUGCHECK_P2: 0

BUGCHECK_P3: fffff80653bf9171

BUGCHECK_P4: 2

READ_ADDRESS: fffff806542fa388: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
fffff8065420f2a8: Unable to get Flags value from nt!KdVersionBlock
fffff8065420f2a8: Unable to get Flags value from nt!KdVersionBlock
unable to get nt!MmSpecialPagesInUse
ffffac87dbf57068

MM_INTERNAL_CODE: 2

CUSTOMER_CRASH_COUNT: 1

PROCESS_NAME: steam.exe

TRAP_FRAME: ffff8c812267d590 -- (.trap 0xffff8c812267d590)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=00ffffac87dbf570 rbx=0000000000000000 rcx=00000000001fffff
rdx=ffffac86cbaa16c0 rsi=0000000000000000 rdi=0000000000000000
rip=fffff80653bf9171 rsp=ffff8c812267d720 rbp=00000000001fffff
r8=ffffd70b6e33f001 r9=fffff80653600000 r10=0000fffff80653c0
r11=ffff8af9f6c00000 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei pl nz ac pe nc
nt!ObpReferenceObjectByHandleWithTag+0x191:
fffff80653bf9171 324318 xor al,byte ptr [rbx+18h] ds:0000000000000018=??
Resetting default scope

STACK_TEXT:
ffff8c812267d2e8 fffff80653a35d15 : 0000000000000050 ffffac87dbf57068 0000000000000000 ffff8c812267d590 : nt!KeBugCheckEx
ffff8c812267d2f0 fffff80653812d00 : 0000000000000000 0000000000000000 ffff8c812267d610 0000000000000000 : nt!MiSystemFault+0x1ad5c5
ffff8c812267d3f0 fffff806539ebc1e : ffffbf0ac5f0b010 ffffbf0ac5d73bd0 0000000000000000 00003dff00000003 : nt!MmAccessFault+0x400
ffff8c812267d590 fffff80653bf9171 : 0000000000000001 ffffac86dbf85040 0000000000000000 0000000000000000 : nt!KiPageFault+0x35e
ffff8c812267d720 fffff80653bf8f91 : ffffac86daef4080 0000000000000800 ffffac86cbaa16c0 ffffbf3456e5e201 : nt!ObpReferenceObjectByHandleWithTag+0x191
ffff8c812267d7b0 fffff80653c084d7 : fffff80653951a20 fffff806538e73ef 0000000000000000 fffff80600000000 : nt!ObReferenceObjectByHandleWithTag+0x31
ffff8c812267d800 fffff806539ef478 : 00000000012fe048 000000000001070c ffff8c812267db80 000000000001070c : nt!NtQueryInformationThread+0x407
ffff8c812267da90 00007ff9dc68b234 : 0000000000000000 0000000000000000 0000000000000000 0000000000000000 : nt!KiSystemServiceCopyEnd+0x28
0000000000fee0f8 0000000000000000 : 0000000000000000 0000000000000000 0000000000000000 0000000000000000 : 0x00007ff9dc68b234


SYMBOL_NAME: nt!ObpReferenceObjectByHandleWithTag+191

MODULE_NAME: nt

IMAGE_NAME: ntkrnlmp.exe

IMAGE_VERSION: 10.0.19041.388

STACK_COMMAND: .thread ; .cxr ; kb

BUCKET_ID_FUNC_OFFSET: 191

FAILURE_BUCKET_ID: AV_R_INVALID_nt!ObpReferenceObjectByHandleWithTag

OS_VERSION: 10.0.19041.1

BUILDLAB_STR: vb_release

OSPLATFORM_TYPE: x64

OSNAME: Windows 10

FAILURE_ID_HASH: {f4aa4813-859f-bca9-f895-c515f8dded21}

Followup: MachineOwner
---------

10: kd> .trap 0xffff8c812267d590
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=00ffffac87dbf570 rbx=0000000000000000 rcx=00000000001fffff
rdx=ffffac86cbaa16c0 rsi=0000000000000000 rdi=0000000000000000
rip=fffff80653bf9171 rsp=ffff8c812267d720 rbp=00000000001fffff
r8=ffffd70b6e33f001 r9=fffff80653600000 r10=0000fffff80653c0
r11=ffff8af9f6c00000 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei pl nz ac pe nc
nt!ObpReferenceObjectByHandleWithTag+0x191:
fffff806
53bf9171 324318 xor al,byte ptr [rbx+18h] ds:00000000`00000018=??
 

ASK THE COMMUNITY

TRENDING THREADS