I've recently had a variety of issues with my pc having blue screens or locking up. It's only about a month old, and i've only gotten these issues for the past week or so. I've done no major changes or installs either. Each of my blue screens have different error codes, mostly pointing towards my RAM, and im not sure why this could be, this is my most recent bsod dump, I would appreciate if someone could shine some light on what it means and what caused an issue this time around! Thanks
----------------------------------------------------------------------------------------------------------------------
ATTEMPTED_WRITE_TO_READONLY_MEMORY (be)
An attempt was made to write to readonly memory. The guilty driver is on the
stack trace (and is typically the current instruction pointer).
When possible, the guilty driver's name (Unicode string) is printed on
the bugcheck screen and saved in KiBugCheckDriver.
Arguments:
Arg1: fffff8023d8b1240, Virtual address for the attempted write.
Arg2: 89000001074ad121, PTE contents.
Arg3: fffffe8fb7bf5f60, (reserved)
Arg4: 000000000000000a, (reserved)
Debugging Details:
------------------
KEY_VALUES_STRING: 1
Key : Analysis.CPU.Sec
Value: 9
Key : Analysis.Elapsed.Sec
Value: 24
Key : Analysis.Memory.CommitPeak.Mb
Value: 64
PROCESSES_ANALYSIS: 1
SERVICE_ANALYSIS: 1
STACKHASH_ANALYSIS: 1
TIMELINE_ANALYSIS: 1
DUMP_CLASS: 1
DUMP_QUALIFIER: 401
BUILD_VERSION_STRING: 18362.1.amd64fre.19h1_release.190318-1202
SYSTEM_MANUFACTURER: Gigabyte Technology Co., Ltd.
SYSTEM_PRODUCT_NAME: B450 AORUS PRO
SYSTEM_SKU: Default string
SYSTEM_VERSION: Default string
BIOS_VENDOR: American Megatrends Inc.
BIOS_VERSION: F41b
BIOS_DATE: 07/12/2019
BASEBOARD_MANUFACTURER: Gigabyte Technology Co., Ltd.
BASEBOARD_PRODUCT: B450 AORUS PRO-CF
BASEBOARD_VERSION: x.x
DUMP_TYPE: 1
BUGCHECK_P1: fffff8023d8b1240
BUGCHECK_P2: 89000001074ad121
BUGCHECK_P3: fffffe8fb7bf5f60
BUGCHECK_P4: a
CPU_COUNT: 10
CPU_MHZ: e6d
CPU_VENDOR: AuthenticAMD
CPU_FAMILY: 17
CPU_MODEL: 8
CPU_STEPPING: 2
DEFAULT_BUCKET_ID: WIN8_DRIVER_FAULT
BUGCHECK_STR: 0xBE
PROCESS_NAME: System
CURRENT_IRQL: 2
ANALYSIS_SESSION_HOST: DESKTOP-D7AGB0A
ANALYSIS_SESSION_TIME: 09-01-2019 00:58:48.0944
ANALYSIS_VERSION: 10.0.18914.1001 amd64fre
TRAP_FRAME: fffffe8fb7bf5f60 -- (.trap 0xfffffe8fb7bf5f60)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000000 rbx=0000000000000000 rcx=fffffe8fb7bf6170
rdx=fffff8023d8b1240 rsi=0000000000000000 rdi=0000000000000000
rip=fffff8022be05e0e rsp=fffffe8fb7bf60f0 rbp=fffffe8fb7bf62a0
r8=0000000000000000 r9=0000000000000000 r10=0000000000000000
r11=fffffe8fb7bf6140 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei ng nz na pe nc
nt!KxWaitForLockOwnerShip+0xe:
fffff802
Resetting default scope
LAST_CONTROL_TRANSFER: from fffff8022c04e1c9 to fffff8022bfbfcc0
STACK_TEXT:
fffffe8f
fffffe8f
fffffe8f
fffffe8f
fffffe8f
fffffe8f
fffffe8f
fffffe8f
fffffe8f
fffffe8f
fffffe8f
fffffe8f
fffffe8f
fffffe8f
fffffe8f
fffffe8f
fffffe8f
fffffe8f
THREAD_SHA1_HASH_MOD_FUNC: e6e0f68db9af3a3f066b6492a5fd88eccddace0e
THREAD_SHA1_HASH_MOD_FUNC_OFFSET: cef99dfa5e2963e0037ca7b0f13d086b68e88dbd
THREAD_SHA1_HASH_MOD: 0d038dc6b8d58d7d152e0c90af04c2cf179425b6
FOLLOWUP_IP:
nvlddmkm+cb80c
fffff802
----------------------------------------------------------------------------------------------------------------------
----------------------------------------------------------------------------------------------------------------------
ATTEMPTED_WRITE_TO_READONLY_MEMORY (be)
An attempt was made to write to readonly memory. The guilty driver is on the
stack trace (and is typically the current instruction pointer).
When possible, the guilty driver's name (Unicode string) is printed on
the bugcheck screen and saved in KiBugCheckDriver.
Arguments:
Arg1: fffff8023d8b1240, Virtual address for the attempted write.
Arg2: 89000001074ad121, PTE contents.
Arg3: fffffe8fb7bf5f60, (reserved)
Arg4: 000000000000000a, (reserved)
Debugging Details:
------------------
KEY_VALUES_STRING: 1
Key : Analysis.CPU.Sec
Value: 9
Key : Analysis.Elapsed.Sec
Value: 24
Key : Analysis.Memory.CommitPeak.Mb
Value: 64
PROCESSES_ANALYSIS: 1
SERVICE_ANALYSIS: 1
STACKHASH_ANALYSIS: 1
TIMELINE_ANALYSIS: 1
DUMP_CLASS: 1
DUMP_QUALIFIER: 401
BUILD_VERSION_STRING: 18362.1.amd64fre.19h1_release.190318-1202
SYSTEM_MANUFACTURER: Gigabyte Technology Co., Ltd.
SYSTEM_PRODUCT_NAME: B450 AORUS PRO
SYSTEM_SKU: Default string
SYSTEM_VERSION: Default string
BIOS_VENDOR: American Megatrends Inc.
BIOS_VERSION: F41b
BIOS_DATE: 07/12/2019
BASEBOARD_MANUFACTURER: Gigabyte Technology Co., Ltd.
BASEBOARD_PRODUCT: B450 AORUS PRO-CF
BASEBOARD_VERSION: x.x
DUMP_TYPE: 1
BUGCHECK_P1: fffff8023d8b1240
BUGCHECK_P2: 89000001074ad121
BUGCHECK_P3: fffffe8fb7bf5f60
BUGCHECK_P4: a
CPU_COUNT: 10
CPU_MHZ: e6d
CPU_VENDOR: AuthenticAMD
CPU_FAMILY: 17
CPU_MODEL: 8
CPU_STEPPING: 2
DEFAULT_BUCKET_ID: WIN8_DRIVER_FAULT
BUGCHECK_STR: 0xBE
PROCESS_NAME: System
CURRENT_IRQL: 2
ANALYSIS_SESSION_HOST: DESKTOP-D7AGB0A
ANALYSIS_SESSION_TIME: 09-01-2019 00:58:48.0944
ANALYSIS_VERSION: 10.0.18914.1001 amd64fre
TRAP_FRAME: fffffe8fb7bf5f60 -- (.trap 0xfffffe8fb7bf5f60)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000000 rbx=0000000000000000 rcx=fffffe8fb7bf6170
rdx=fffff8023d8b1240 rsi=0000000000000000 rdi=0000000000000000
rip=fffff8022be05e0e rsp=fffffe8fb7bf60f0 rbp=fffffe8fb7bf62a0
r8=0000000000000000 r9=0000000000000000 r10=0000000000000000
r11=fffffe8fb7bf6140 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei ng nz na pe nc
nt!KxWaitForLockOwnerShip+0xe:
fffff802
2be05e0e 48890a mov qword ptr [rdx],rcx ds:fffff802
3d8b1240=fffff8023d1c9ed0Resetting default scope
LAST_CONTROL_TRANSFER: from fffff8022c04e1c9 to fffff8022bfbfcc0
STACK_TEXT:
fffffe8f
b7bf5d78 fffff802
2c04e1c9 : 00000000000000be fffff802
3d8b1240 89000001074ad121 fffffe8f
b7bf5f60 : nt!KeBugCheckExfffffe8f
b7bf5d80 fffff802
2be72b1a : 89000001074ad121 00000000
00000003 fffffe8fb7bf5ec0 00000000
00000000 : nt!MiRaisedIrqlFault+0x12e639fffffe8f
b7bf5dc0 fffff802
2bfcdd20 : 0000000000000000 00000000
00000000 ffff9c8700000005 fffffe8f
b7bf6000 : nt!MmAccessFault+0x48afffffe8f
b7bf5f60 fffff802
2be05e0e : ffff9c8700002006 fffff802
2be65a54 0000000000000000 ffff9c87
2b035008 : nt!KiPageFault+0x360fffffe8f
b7bf60f0 fffff802
2be3e75d : 0000000000000000 ffff9c87
2b035008 0000000000000000 00000000
00000000 : nt!KxWaitForLockOwnerShip+0xefffffe8f
b7bf6120 fffff802
3d1cb80c : ffff9c872b035000 00000000
00000080 fffffe8fb7bf62a0 fffff802
3d1d29b2 : nt!KeAcquireInStackQueuedSpinLock+0x7dfffffe8f
b7bf6150 fffff802
3d850784 : ffff9c8732c1e008 ffff9c87
2b0f2930 0000000000000001 ffff9c87
32c1e008 : nvlddmkm+0xcb80cfffffe8f
b7bf61a0 fffff802
3d852c00 : 0000000000000000 fffffe8f
b7bf6810 ffff9c8700000000 00000000
00000000 : nvlddmkm+0x750784fffffe8f
b7bf66e0 fffff802
3d830f1e : 0000000000000000 fffffe8f
b7bf7810 0000000000000000 00000000
00000000 : nvlddmkm+0x752c00fffffe8f
b7bf7790 fffff802
3aa153d0 : fffff8023d830d8f 00000000
00000000 0000000000000000 fffff802
3ef2b868 : nvlddmkm+0x730f1efffffe8f
b7bf7840 fffff802
3a9188a9 : 0000000000000000 ffff9c87
2b3a9000 0000000000000000 00000000
0000000c : dxgkrnl!ADAPTER_RENDER:😀diSubmitCommandVirtual+0x170fffffe8f
b7bf78f0 fffff802
3ef292f2 : 000000000000000c 00000000
0000000c fffffe8fb7bf79e9 ffff9c87
2b427000 : dxgkrnl!ADAPTER_RENDER_DdiSubmitCommandVirtual+0x9fffffe8f
b7bf7920 fffff802
3ef99190 : fffff78000000000 00000000
00000002 ffff9c872b3a9000 ffff9c87
2b42a9d0 : dxgmms2!VidSchiSendToExecutionQueue+0x4f2fffffe8f
b7bf7a50 fffff802
3efa6f7d : ffff9c872e7d7000 00000000
00000000 ffff9c872b427000 ffff9c87
2c264010 : dxgmms2!VidSchiSubmitRenderVirtualCommand+0x350fffffe8f
b7bf7b80 fffff802
3efa6e1a : ffff9c872b3a9400 fffff802
3efa6d50 ffff9c872b3a9000 00000000
00000000 : dxgmms2!VidSchiRun_PriorityTable+0x14dfffffe8f
b7bf7bd0 fffff802
2bf29e95 : ffff9c872b3b7280 fffff802
00000001 ffff9c872b3a9000 00000067
b4bbbdff : dxgmms2!VidSchiWorkerThread+0xcafffffe8f
b7bf7c10 fffff802
2bfc730a : ffffc301719e0180 ffff9c87
2b3b7280 fffff8022bf29e40 00000000
007a57ec : nt!PspSystemThreadStartup+0x55fffffe8f
b7bf7c60 00000000
00000000 : fffffe8fb7bf8000 fffffe8f
b7bf2000 0000000000000000 00000000
00000000 : nt!KiStartSystemThread+0x2aTHREAD_SHA1_HASH_MOD_FUNC: e6e0f68db9af3a3f066b6492a5fd88eccddace0e
THREAD_SHA1_HASH_MOD_FUNC_OFFSET: cef99dfa5e2963e0037ca7b0f13d086b68e88dbd
THREAD_SHA1_HASH_MOD: 0d038dc6b8d58d7d152e0c90af04c2cf179425b6
FOLLOWUP_IP:
nvlddmkm+cb80c
fffff802
3d1cb80c 8b9bb0010000 mov ebx,dword ptr [rbx+1B0h]
FAULT_INSTR_CODE: 1b09b8b
SYMBOL_STACK_INDEX: 6
SYMBOL_NAME: nvlddmkm+cb80c
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: nvlddmkm
IMAGE_NAME: nvlddmkm.sys
DEBUG_FLR_IMAGE_TIMESTAMP: 5d6205fc
STACK_COMMAND: .thread ; .cxr ; kb
BUCKET_ID_FUNC_OFFSET: cb80c
FAILURE_BUCKET_ID: 0xBE_nvlddmkm!unknown_function
BUCKET_ID: 0xBE_nvlddmkm!unknown_function
PRIMARY_PROBLEM_CLASS: 0xBE_nvlddmkm!unknown_function
TARGET_TIME: 2019-08-31T23:49:52.000Z
OSBUILD: 18362
OSSERVICEPACK: 0
SERVICEPACK_NUMBER: 0
OS_REVISION: 0
SUITE_MASK: 272
PRODUCT_TYPE: 1
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
OSEDITION: Windows 10 WinNt TerminalServer SingleUserTS
OS_LOCALE:
USER_LCID: 0
OSBUILD_TIMESTAMP: 1998-05-30 22:12:57
BUILDDATESTAMP_STR: 190318-1202
BUILDLAB_STR: 19h1_release
BUILDOSVER_STR: 10.0.18362.1.amd64fre.19h1_release.190318-1202
ANALYSIS_SESSION_ELAPSED_TIME: 5f3b
ANALYSIS_SOURCE: KM
FAILURE_ID_HASH_STRING: km:0xbe_nvlddmkm!unknown_function
FAILURE_ID_HASH: {08a1ec91-a303-c95c-11b2-29263c1e330d}
Followup: MachineOwner
---------
10: kd> lmvm nvlddmkm
Browse full module list
start end module name
fffff802
3d100000 fffff8023e6b6000 nvlddmkm (no symbols)
Loaded symbol image file: nvlddmkm.sys
Image path: \SystemRoot\System32\DriverStore\FileRepository\nv_dispi.inf_amd64_ff72214788d99390\nvlddmkm.sys
Image name: nvlddmkm.sys
Browse all global symbols functions data
Timestamp: Sat Aug 24 20:52:28 2019 (5D6205FC)
CheckSum: 0155912F
ImageSize: 015B6000
Translations: 0000.04b0 0000.04e4 0409.04b0 0409.04e4
Information from resource tables:
10: kd> .trap 0xfffffe8fb7bf5f60
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000000 rbx=0000000000000000 rcx=fffffe8fb7bf6170
rdx=fffff8023d8b1240 rsi=0000000000000000 rdi=0000000000000000
rip=fffff8022be05e0e rsp=fffffe8fb7bf60f0 rbp=fffffe8fb7bf62a0
r8=0000000000000000 r9=0000000000000000 r10=0000000000000000
r11=fffffe8fb7bf6140 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei ng nz na pe nc
nt!KxWaitForLockOwnerShip+0xe:
fffff802
2be05e0e 48890a mov qword ptr [rdx],rcx ds:fffff802`3d8b1240=fffff8023d1c9ed0----------------------------------------------------------------------------------------------------------------------