I'm having tons of issues with my system blue screening, failing to update, and failing to be able to do system checks like sfc of dism. I get memory managment BSOD most of the time.
I have two M.2 NVMe SSDs one of which I boot windows with, one SATA SSD and a 2TB hard drive. If you need any other info please let me know!
I have two M.2 NVMe SSDs one of which I boot windows with, one SATA SSD and a 2TB hard drive. If you need any other info please let me know!
Code:
Symbol search path is: srv*
Executable search path is:
Windows 10 Kernel Version 19041 MP (12 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS Personal
Edition build lab: 19041.1.amd64fre.vb_release.191206-1406
Machine Name:
Kernel base = 0xfffff806`4f400000 PsLoadedModuleList = 0xfffff806`5002a230
Debug session time: Thu Jul 1 11:36:49.138 2021 (UTC - 6:00)
System Uptime: 0 days 0:00:21.748
Loading Kernel Symbols
...............................................................
................................................................
...................................................
Loading User Symbols
Loading unloaded module list
.......
For analysis of this file, run !analyze -v
nt!KeBugCheckEx:
fffff806`4f7f6c20 48894c2408 mov qword ptr [rsp+8],rcx ss:0018:ffffec86`b9a300d0=000000000000001a
8: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
MEMORY_MANAGEMENT (1a)
# Any other values for parameter 1 must be individually examined.
Arguments:
Arg1: 0000000000041792, A corrupt PTE has been detected. Parameter 2 contains the address of
the PTE. Parameters 3/4 contain the low/high parts of the PTE.
Arg2: ffffbc00dcdaab30
Arg3: 0000080000000000
Arg4: 0000000000000000
Debugging Details:
------------------
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 3077
Key : Analysis.DebugAnalysisManager
Value: Create
Key : Analysis.Elapsed.mSec
Value: 13753
Key : Analysis.Init.CPU.mSec
Value: 609
Key : Analysis.Init.Elapsed.mSec
Value: 24236
Key : Analysis.Memory.CommitPeak.Mb
Value: 82
Key : MemoryManagement.PFN
Value: 80000000
Key : WER.OS.Branch
Value: vb_release
Key : WER.OS.Timestamp
Value: 2019-12-06T14:06:00Z
Key : WER.OS.Version
Value: 10.0.19041.1
BUGCHECK_CODE: 1a
BUGCHECK_P1: 41792
BUGCHECK_P2: ffffbc00dcdaab30
BUGCHECK_P3: 80000000000
BUGCHECK_P4: 0
MEMORY_CORRUPTOR: ONE_BIT
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXPNP: 1 (!blackboxpnp)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: HxT
STACK_TEXT:
ffffec86`b9a300c8 fffff806`4f64423a : 00000000`0000001a 00000000`00041792 ffffbc00`dcdaab30 00000800`00000000 : nt!KeBugCheckEx
ffffec86`b9a300d0 fffff806`4f642a6f : ffffbd84`2cc1c700 00000000`00000000 ffffbc00`00000002 00000000`00000000 : nt!MiDeleteVa+0x153a
ffffec86`b9a301d0 fffff806`4f612c10 : 00000000`00000001 ffffec86`00000000 ffffbd84`2cc1c550 ffffbd84`2c7a60c0 : nt!MiDeletePagablePteRange+0x48f
ffffec86`b9a304e0 fffff806`4fa00b49 : ffffbd84`2cdb4b60 00000000`00000000 ffffbd84`00000000 ffffbd84`00000000 : nt!MiDeleteVad+0x360
ffffec86`b9a305f0 fffff806`4fa001e0 : ffffbd84`2cdb4b60 ffffbd84`2c942d20 ffffbd84`2c7a60c0 00000000`00000000 : nt!MiUnmapVad+0x49
ffffec86`b9a30620 fffff806`4f9fe4af : ffffbd84`2cdbeb60 ffffbd84`2cdbeb60 ffffbd84`2cdb4b60 ffffbd84`2cc1c080 : nt!MiCleanVad+0x30
ffffec86`b9a30650 fffff806`4fac9388 : ffffffff`00000001 ffffffff`ffffffff 00000000`00000001 ffffbd84`2cc1c080 : nt!MmCleanProcessAddressSpace+0x137
ffffec86`b9a306d0 fffff806`4fa5b886 : ffffbd84`2cc1c080 ffffab8f`629ca060 ffffec86`b9a30920 00000000`00000000 : nt!PspRundownSingleProcess+0x20c
ffffec86`b9a30760 fffff806`4faa56c8 : 00000000`00000001 00000000`00000001 00000000`00000000 000000a2`738ee000 : nt!PspExitThread+0x5f6
ffffec86`b9a30860 fffff806`4f60f0d7 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSchedulerApcTerminate+0x38
ffffec86`b9a308a0 fffff806`4f7fb1c0 : 00000000`00000000 ffffec86`b9a30950 00000000`00000000 00000000`00000000 : nt!KiDeliverApc+0x487
ffffec86`b9a30950 fffff806`4f80865f : 00000000`00000000 ffffec86`b9a30b80 ffffbd84`2c7a60c0 00000000`00000000 : nt!KiInitiateUserApc+0x70
ffffec86`b9a30a90 00007ffd`ecaed974 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceExit+0x9f
000000a2`751ff7f8 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffd`ecaed974
MODULE_NAME: hardware
IMAGE_NAME: memory_corruption
STACK_COMMAND: .thread ; .cxr ; kb
FAILURE_BUCKET_ID: MEMORY_CORRUPTION_ONE_BIT
OS_VERSION: 10.0.19041.1
BUILDLAB_STR: vb_release
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {e3faf315-c3d0-81db-819a-6c43d23c63a7}
Followup: MachineOwner
Code:
Symbol search path is: srv*
Executable search path is:
Windows 10 Kernel Version 19041 MP (12 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS Personal
Edition build lab: 19041.1.amd64fre.vb_release.191206-1406
Machine Name:
Kernel base = 0xfffff806`50600000 PsLoadedModuleList = 0xfffff806`5122a230
Debug session time: Thu Jul 1 11:33:55.442 2021 (UTC - 6:00)
System Uptime: 0 days 0:00:29.052
Loading Kernel Symbols
...............................................................
................................................................
..................................................
Loading User Symbols
Loading unloaded module list
........
For analysis of this file, run !analyze -v
nt!KeBugCheckEx:
fffff806`509f6c20 48894c2408 mov qword ptr [rsp+8],rcx ss:0018:ffff8c05`5e436bb0=000000000000001a
6: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
MEMORY_MANAGEMENT (1a)
# Any other values for parameter 1 must be individually examined.
Arguments:
Arg1: 0000000000041790, A page table page has been corrupted. On a 64 bit OS, parameter 2
contains the address of the PFN for the corrupted page table page.
On a 32 bit OS, parameter 2 contains a pointer to the number of used
PTEs, and parameter 3 contains the number of used PTEs.
Arg2: ffffb6800bc4f390
Arg3: 00000000000001ff
Arg4: 0000000000000200
Debugging Details:
------------------
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 4062
Key : Analysis.DebugAnalysisManager
Value: Create
Key : Analysis.Elapsed.mSec
Value: 13895
Key : Analysis.Init.CPU.mSec
Value: 437
Key : Analysis.Init.Elapsed.mSec
Value: 19429
Key : Analysis.Memory.CommitPeak.Mb
Value: 80
Key : WER.OS.Branch
Value: vb_release
Key : WER.OS.Timestamp
Value: 2019-12-06T14:06:00Z
Key : WER.OS.Version
Value: 10.0.19041.1
BUGCHECK_CODE: 1a
BUGCHECK_P1: 41790
BUGCHECK_P2: ffffb6800bc4f390
BUGCHECK_P3: 1ff
BUGCHECK_P4: 200
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXPNP: 1 (!blackboxpnp)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: SearchApp.exe
STACK_TEXT:
ffff8c05`5e436ba8 fffff806`50a626bf : 00000000`0000001a 00000000`00041790 ffffb680`0bc4f390 00000000`000001ff : nt!KeBugCheckEx
ffff8c05`5e436bb0 fffff806`509ee328 : 00000000`00000200 ffffb680`0bc4c0c0 ffffb680`0bc4f390 00000000`00000000 : nt!MiDecreaseUsedPtesCount+0x173cfb
ffff8c05`5e436bf0 fffff806`5083b38a : 00000000`003ec404 80000000`00000000 00000000`00000001 00000000`00000004 : nt!MiReducePteUseCount+0x30
ffff8c05`5e436c20 fffff806`5093898c : ffff8c05`5e436f90 ffffbd04`728400c0 00000000`00000000 ffff8c05`5e437910 : nt!MiDeletePteList+0x88a
ffff8c05`5e436d00 fffff806`50bf9bed : ffffbd04`7340f040 ffffbd04`72dce528 ffffbd04`00000000 ffffbd04`00000000 : nt!MiDecommitPages+0x3bc
ffff8c05`5e4378d0 fffff806`50bf9253 : ffff8c05`5e437a50 00000000`00000000 ffff8c05`5e437a50 ffffbd04`72dce500 : nt!MiDecommitRegion+0x7d
ffff8c05`5e437950 fffff806`50bf8b45 : 00000000`00000000 ffff8c05`5e437b80 ffffc467`a3dec9f9 00000000`00000000 : nt!MmFreeVirtualMemory+0x6d3
ffff8c05`5e437aa0 fffff806`50a085b8 : ffffbd04`7340f040 00000000`00000000 ffff8c05`5e437b80 0000001f`c0000034 : nt!NtFreeVirtualMemory+0x95
ffff8c05`5e437b00 00007ffe`eb7cd1e4 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x28
0000001f`c5efccd8 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffe`eb7cd1e4
SYMBOL_NAME: nt!MiDecreaseUsedPtesCount+173cfb
MODULE_NAME: nt
IMAGE_VERSION: 10.0.19041.1052
STACK_COMMAND: .thread ; .cxr ; kb
IMAGE_NAME: ntkrnlmp.exe
BUCKET_ID_FUNC_OFFSET: 173cfb
FAILURE_BUCKET_ID: 0x1a_41790_nt!MiDecreaseUsedPtesCount
OS_VERSION: 10.0.19041.1
BUILDLAB_STR: vb_release
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {3a4e374b-adfe-575c-a9c4-4050eb1047a4}
Followup: MachineOwner
---------
Code:
Symbol search path is: srv*
Executable search path is:
Windows 10 Kernel Version 19041 MP (12 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS Personal
Edition build lab: 19041.1.amd64fre.vb_release.191206-1406
Machine Name:
Kernel base = 0xfffff803`73a00000 PsLoadedModuleList = 0xfffff803`7462a230
Debug session time: Thu Jul 1 11:32:48.206 2021 (UTC - 6:00)
System Uptime: 0 days 0:13:41.816
Loading Kernel Symbols
...............................................................
................................................................
..................................................
Loading User Symbols
Loading unloaded module list
.........
For analysis of this file, run !analyze -v
nt!KeBugCheckEx:
fffff803`73df6c20 48894c2408 mov qword ptr [rsp+8],rcx ss:0018:ffffce01`f46987e0=00000000000000be
2: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
ATTEMPTED_WRITE_TO_READONLY_MEMORY (be)
An attempt was made to write to readonly memory. The guilty driver is on the
stack trace (and is typically the current instruction pointer).
When possible, the guilty driver's name (Unicode string) is printed on
the BugCheck screen and saved in KiBugCheckDriver.
Arguments:
Arg1: ffffc980645b90e8, Virtual address for the attempted write.
Arg2: 8a00000004400121, PTE contents.
Arg3: ffffce01f46989d0, (reserved)
Arg4: 000000000000000a, (reserved)
Debugging Details:
------------------
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 4203
Key : Analysis.DebugAnalysisManager
Value: Create
Key : Analysis.Elapsed.mSec
Value: 10210
Key : Analysis.Init.CPU.mSec
Value: 421
Key : Analysis.Init.Elapsed.mSec
Value: 7423
Key : Analysis.Memory.CommitPeak.Mb
Value: 81
Key : WER.OS.Branch
Value: vb_release
Key : WER.OS.Timestamp
Value: 2019-12-06T14:06:00Z
Key : WER.OS.Version
Value: 10.0.19041.1
BUGCHECK_CODE: be
BUGCHECK_P1: ffffc980645b90e8
BUGCHECK_P2: 8a00000004400121
BUGCHECK_P3: ffffce01f46989d0
BUGCHECK_P4: a
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXPNP: 1 (!blackboxpnp)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: svchost.exe
TRAP_FRAME: ffffce01f46989d0 -- (.trap 0xffffce01f46989d0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=7fffffffffffffff rbx=0000000000000000 rcx=800000000000004c
rdx=3fffffffffffffff rsi=0000000000000000 rdi=0000000000000000
rip=fffff80373f5369a rsp=ffffce01f4698b60 rbp=ffffce01f4698c49
r8=ffffc98005e95d50 r9=fffff80374650b00 r10=ffff808000000000
r11=ffffce01f4698df0 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei pl zr na po nc
nt!MiBuildForkPte+0x62e:
fffff803`73f5369a f0490fba6d183f lock bts qword ptr [r13+18h],3Fh ds:00000000`00000018=????????????????
Resetting default scope
STACK_TEXT:
ffffce01`f46987d8 fffff803`73e56cbe : 00000000`000000be ffffc980`645b90e8 8a000000`04400121 ffffce01`f46989d0 : nt!KeBugCheckEx
ffffce01`f46987e0 fffff803`73d282ff : 8a000000`04400121 00000000`00000003 ffffce01`f4698a50 00000000`00000000 : nt!MiRaisedIrqlFault+0x184042
ffffce01`f4698830 fffff803`73e04d5e : 00000000`00000000 00000000`00000000 00000000`00000000 fffff803`73cefd2c : nt!MmAccessFault+0x4ef
ffffce01`f46989d0 fffff803`73f5369a : 81000021`73daf005 ffffce01`00000000 ffff870d`05064940 ffffb885`93020701 : nt!KiPageFault+0x35e
ffffce01`f4698b60 fffff803`73f54583 : ffffb885`92e88080 ffffb885`93020080 ffff80bf`ffe356d8 ffffc980`078f3930 : nt!MiBuildForkPte+0x62e
ffffce01`f4698c90 fffff803`742d63b1 : ffffb885`92e88080 ffffce01`f4698f99 ffffb885`93020080 ffffb885`93020080 : nt!MiCloneVads+0x4ab
ffffce01`f4698f20 fffff803`741faa77 : 00000000`00000000 ffffce01`00000000 00000000`00000000 00000000`00000000 : nt!MiCloneProcessAddressSpace+0x261
ffffce01`f4699000 fffff803`7401209f : 00000000`00002ab0 ffffce01`f4699b80 00000000`00000000 00000000`00000000 : nt!MmInitializeProcessAddressSpace+0x19bbbb
ffffce01`f46991f0 fffff803`741ba972 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!PspAllocateProcess+0x1c4f
ffffce01`f4699760 fffff803`74304435 : ffff4ec3`c7170d83 ffff4ec3`c7170c23 00000000`00000000 00000000`00000000 : nt!PspCreateProcess+0x242
ffffce01`f4699a30 fffff803`73e085b8 : 00000000`00000000 00000000`00000000 00000000`77566d4d ffffce01`f4699ae8 : nt!NtCreateProcessEx+0x85
ffffce01`f4699a90 00007fff`df90d7c4 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x28
0000000a`028df308 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007fff`df90d7c4
SYMBOL_NAME: nt!MiRaisedIrqlFault+184042
MODULE_NAME: nt
IMAGE_VERSION: 10.0.19041.1052
STACK_COMMAND: .thread ; .cxr ; kb
IMAGE_NAME: ntkrnlmp.exe
BUCKET_ID_FUNC_OFFSET: 184042
FAILURE_BUCKET_ID: 0xBE_nt!MiRaisedIrqlFault
OS_VERSION: 10.0.19041.1
BUILDLAB_STR: vb_release
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {1c5b4d11-09e0-def3-d2d0-70a11d69b92d}
Followup: MachineOwner
---------