B
BenS_2
I recently built a new PC which has been getting frequent crashes. Can anyone help me solve this issue, included below is a Minidump from the most
recent crash, as well some computer part information if that helps. Please let me know if you need any more information and thank you for your response.
Initially, the crashes would result in a Event 41, Kernel-Power error with a BugcheckCode of 0 and no minidump file.
After updating the chipset drivers, reseting power plan options, updating the BIOS, and running CHKDSK the system still crashes randomly,
however it now provides the following information, after crashing, in EventViewer:
S<System>
<Provider Name="Microsoft-Windows-Kernel-Power" Guid="{331c3b3a-2005-44c2-ac5e-77220c37d6b4}" />
<EventID>41</EventID>
<Version>8</Version>
<Level>1</Level>
<Task>63</Task>
<Opcode>0</Opcode>
<Keywords>0x8000400000000002</Keywords>
<TimeCreated SystemTime="2020-12-17T17:21:04.5334425Z" />
<EventRecordID>40027</EventRecordID>
<Correlation />
<Execution ProcessID="4" ThreadID="8" />
<Channel>System</Channel>
<Computer>DESKTOP-CPBLSQJ</Computer>
<Security UserID="S-1-5-18" />
</System>
- <EventData>
<Data Name="BugcheckCode">26</Data>
<Data Name="BugcheckParameter1">0x41790</Data>
<Data Name="BugcheckParameter2">0xffffa98014461230</Data>
<Data Name="BugcheckParameter3">0xbd</Data>
<Data Name="BugcheckParameter4">0xbe</Data>
<Data Name="SleepInProgress">0</Data>
<Data Name="PowerButtonTimestamp">0</Data>
<Data Name="BootAppStatus">0</Data>
<Data Name="Checkpoint">0</Data>
<Data Name="ConnectedStandbyInProgress">false</Data>
<Data Name="SystemSleepTransitionsToOn">0</Data>
<Data Name="CsEntryScenarioInstanceId">0</Data>
<Data Name="BugcheckInfoFromEFI">false</Data>
<Data Name="CheckpointStatus">0</Data>
<Data Name="CsEntryScenarioInstanceIdV2">0</Data>
<Data Name="LongPowerButtonPressDetected">false</Data>
</EventData>
As well as the following Minidump:
3: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
MEMORY_MANAGEMENT (1a)
# Any other values for parameter 1 must be individually examined.
Arguments:
Arg1: 0000000000041790, A page table page has been corrupted. On a 64 bit OS, parameter 2
contains the address of the PFN for the corrupted page table page.
On a 32 bit OS, parameter 2 contains a pointer to the number of used
PTEs, and parameter 3 contains the number of used PTEs.
Arg2: ffffa98014461230
Arg3: 00000000000000bd
Arg4: 00000000000000be
Debugging Details:
------------------
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 3577
Key : Analysis.DebugAnalysisProvider.CPP
Value: Create: 8007007e on DESKTOP-CPBLSQJ
Key : Analysis.DebugData
Value: CreateObject
Key : Analysis.DebugModel
Value: CreateObject
Key : Analysis.Elapsed.mSec
Value: 3660
Key : Analysis.Memory.CommitPeak.Mb
Value: 80
Key : Analysis.System
Value: CreateObject
Key : WER.OS.Branch
Value: vb_release
Key : WER.OS.Timestamp
Value: 2019-12-06T14:06:00Z
Key : WER.OS.Version
Value: 10.0.19041.1
ADDITIONAL_XML: 1
OS_BUILD_LAYERS: 1
BUGCHECK_CODE: 1a
BUGCHECK_P1: 41790
BUGCHECK_P2: ffffa98014461230
BUGCHECK_P3: bd
BUGCHECK_P4: be
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXPNP: 1 (!blackboxpnp)
BLACKBOXWINLOGON: 1
PROCESS_NAME: chrome.exe
STACK_TEXT:
ffffc483`f009fc78 fffff800`40a9a5da : 00000000`0000001a 00000000`00041790 ffffa980`14461230 00000000`000000bd : nt!KeBugCheckEx
ffffc483`f009fc80 fffff800`40a9ad6e : 00000000`00000000 ffffc483`f00a0390 ffffca3f`fc3e4000 ffffc483`f00a02e0 : nt!MiDeletePteRun+0x17da
ffffc483`f009fe90 fffff800`40a0bedd : 00000000`00000000 ffffb20b`9acef940 ffffc483`f00a02e0 ffffca3f`fc3e3f40 : nt!MiDeleteVaTail+0x6e
ffffc483`f009fec0 fffff800`40a0bafb : ffffca65`00000000 ffffb20b`9acef940 ffffc483`00000000 ffffc483`f00a0330 : nt!MiWalkPageTablesRecursively+0xc6d
ffffc483`f009ff60 fffff800`40a0bafb : ffffca65`00000000 ffffb20b`9acef940 ffffc483`00000001 ffffc483`f00a0340 : nt!MiWalkPageTablesRecursively+0x88b
ffffc483`f00a0000 fffff800`40a0bafb : ffffca65`328ff000 ffffb20b`9acef940 ffffc483`00000002 ffffc483`f00a0350 : nt!MiWalkPageTablesRecursively+0x88b
ffffc483`f00a00a0 fffff800`40a5de6b : 00000000`00000000 ffffb20b`9acef940 00000000`00000003 ffffc483`f00a0360 : nt!MiWalkPageTablesRecursively+0x88b
ffffc483`f00a0140 fffff800`40a9b991 : ffffc483`f00a02e0 ffffb20b`00000000 ffffca3e`00000002 00000000`00000000 : nt!MiWalkPageTables+0x36b
ffffc483`f00a0240 fffff800`40a6baf0 : 00000000`00000001 ffffc483`00000000 ffffb20b`9acef790 ffffb20b`9455c380 : nt!MiDeletePagablePteRange+0x4f1
ffffc483`f00a0550 fffff800`40e35c99 : ffffb20b`9f21e0a0 00000000`00000000 ffffb20b`00000000 ffffb20b`00000000 : nt!MiDeleteVad+0x360
ffffc483`f00a0660 fffff800`40e35330 : ffffb20b`9f21e0a0 ffffb20b`9125c010 ffffb20b`9455c380 00000000`00000000 : nt!MiUnmapVad+0x49
ffffc483`f00a0690 fffff800`40e335ff : ffffb20b`9f21b260 ffffb20b`9f21b260 ffffb20b`9f21e0a0 ffffb20b`9acef2c0 : nt!MiCleanVad+0x30
ffffc483`f00a06c0 fffff800`40e5d6e4 : ffffffff`00000000 ffffffff`ffffffff 00000000`00000001 ffffb20b`9acef2c0 : nt!MmCleanProcessAddressSpace+0x137
ffffc483`f00a0740 fffff800`40f06596 : ffffb20b`9acef2c0 ffffcb80`a4b81060 ffffc483`f00a0990 00000000`00000000 : nt!PspRundownSingleProcess+0x20c
ffffc483`f00a07d0 fffff800`40ed22e8 : 00000000`00000000 ffffb20b`9acef201 00000000`00000001 000000c6`30588000 : nt!PspExitThread+0x5f6
ffffc483`f00a08d0 fffff800`40a67fb7 : 00000000`00000000 fffff800`40a65b77 00000000`00000000 00000000`00000000 : nt!KiSchedulerApcTerminate+0x38
ffffc483`f00a0910 fffff800`40bf9d20 : 00000000`00000000 ffffc483`f00a09c0 ffffb20b`0000000f 00000000`00000000 : nt!KiDeliverApc+0x487
ffffc483`f00a09c0 fffff800`40c0725f : 00000000`00002650 00000000`00000000 00000000`00000000 ffffb20b`00000000 : nt!KiInitiateUserApc+0x70
ffffc483`f00a0b00 00007ff8`e7b0f9a4 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceExit+0x9f
000000c6`36dff9b8 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ff8`e7b0f9a4
SYMBOL_NAME: nt!MiDeletePteRun+17da
MODULE_NAME: nt
STACK_COMMAND: .thread ; .cxr ; kb
IMAGE_NAME: ntkrnlmp.exe
BUCKET_ID_FUNC_OFFSET: 17da
FAILURE_BUCKET_ID: 0x1a_41790_nt!MiDeletePteRun
OS_VERSION: 10.0.19041.1
BUILDLAB_STR: vb_release
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {27ce5d5a-97b1-faf0-183f-c86809269d56}
Followup: MachineOwner
---------
PC components:
CPU: Ryzen 7 3700X
Motherboard: Asus ROG Strix X570-i
RAM: Corsair 2 x 16gb 3200 Mhz (Model: Corsair CMW32GX4M2C3200C16)
PSU: Thermaltake Toughpower GF1 750W 80+ Gold
SSD: Sabrent Rocket 1TBGPU: Gigabyte RTX 2070 Super
Continue reading...
recent crash, as well some computer part information if that helps. Please let me know if you need any more information and thank you for your response.
Initially, the crashes would result in a Event 41, Kernel-Power error with a BugcheckCode of 0 and no minidump file.
After updating the chipset drivers, reseting power plan options, updating the BIOS, and running CHKDSK the system still crashes randomly,
however it now provides the following information, after crashing, in EventViewer:
S<System>
<Provider Name="Microsoft-Windows-Kernel-Power" Guid="{331c3b3a-2005-44c2-ac5e-77220c37d6b4}" />
<EventID>41</EventID>
<Version>8</Version>
<Level>1</Level>
<Task>63</Task>
<Opcode>0</Opcode>
<Keywords>0x8000400000000002</Keywords>
<TimeCreated SystemTime="2020-12-17T17:21:04.5334425Z" />
<EventRecordID>40027</EventRecordID>
<Correlation />
<Execution ProcessID="4" ThreadID="8" />
<Channel>System</Channel>
<Computer>DESKTOP-CPBLSQJ</Computer>
<Security UserID="S-1-5-18" />
</System>
- <EventData>
<Data Name="BugcheckCode">26</Data>
<Data Name="BugcheckParameter1">0x41790</Data>
<Data Name="BugcheckParameter2">0xffffa98014461230</Data>
<Data Name="BugcheckParameter3">0xbd</Data>
<Data Name="BugcheckParameter4">0xbe</Data>
<Data Name="SleepInProgress">0</Data>
<Data Name="PowerButtonTimestamp">0</Data>
<Data Name="BootAppStatus">0</Data>
<Data Name="Checkpoint">0</Data>
<Data Name="ConnectedStandbyInProgress">false</Data>
<Data Name="SystemSleepTransitionsToOn">0</Data>
<Data Name="CsEntryScenarioInstanceId">0</Data>
<Data Name="BugcheckInfoFromEFI">false</Data>
<Data Name="CheckpointStatus">0</Data>
<Data Name="CsEntryScenarioInstanceIdV2">0</Data>
<Data Name="LongPowerButtonPressDetected">false</Data>
</EventData>
As well as the following Minidump:
3: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
MEMORY_MANAGEMENT (1a)
# Any other values for parameter 1 must be individually examined.
Arguments:
Arg1: 0000000000041790, A page table page has been corrupted. On a 64 bit OS, parameter 2
contains the address of the PFN for the corrupted page table page.
On a 32 bit OS, parameter 2 contains a pointer to the number of used
PTEs, and parameter 3 contains the number of used PTEs.
Arg2: ffffa98014461230
Arg3: 00000000000000bd
Arg4: 00000000000000be
Debugging Details:
------------------
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 3577
Key : Analysis.DebugAnalysisProvider.CPP
Value: Create: 8007007e on DESKTOP-CPBLSQJ
Key : Analysis.DebugData
Value: CreateObject
Key : Analysis.DebugModel
Value: CreateObject
Key : Analysis.Elapsed.mSec
Value: 3660
Key : Analysis.Memory.CommitPeak.Mb
Value: 80
Key : Analysis.System
Value: CreateObject
Key : WER.OS.Branch
Value: vb_release
Key : WER.OS.Timestamp
Value: 2019-12-06T14:06:00Z
Key : WER.OS.Version
Value: 10.0.19041.1
ADDITIONAL_XML: 1
OS_BUILD_LAYERS: 1
BUGCHECK_CODE: 1a
BUGCHECK_P1: 41790
BUGCHECK_P2: ffffa98014461230
BUGCHECK_P3: bd
BUGCHECK_P4: be
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXPNP: 1 (!blackboxpnp)
BLACKBOXWINLOGON: 1
PROCESS_NAME: chrome.exe
STACK_TEXT:
ffffc483`f009fc78 fffff800`40a9a5da : 00000000`0000001a 00000000`00041790 ffffa980`14461230 00000000`000000bd : nt!KeBugCheckEx
ffffc483`f009fc80 fffff800`40a9ad6e : 00000000`00000000 ffffc483`f00a0390 ffffca3f`fc3e4000 ffffc483`f00a02e0 : nt!MiDeletePteRun+0x17da
ffffc483`f009fe90 fffff800`40a0bedd : 00000000`00000000 ffffb20b`9acef940 ffffc483`f00a02e0 ffffca3f`fc3e3f40 : nt!MiDeleteVaTail+0x6e
ffffc483`f009fec0 fffff800`40a0bafb : ffffca65`00000000 ffffb20b`9acef940 ffffc483`00000000 ffffc483`f00a0330 : nt!MiWalkPageTablesRecursively+0xc6d
ffffc483`f009ff60 fffff800`40a0bafb : ffffca65`00000000 ffffb20b`9acef940 ffffc483`00000001 ffffc483`f00a0340 : nt!MiWalkPageTablesRecursively+0x88b
ffffc483`f00a0000 fffff800`40a0bafb : ffffca65`328ff000 ffffb20b`9acef940 ffffc483`00000002 ffffc483`f00a0350 : nt!MiWalkPageTablesRecursively+0x88b
ffffc483`f00a00a0 fffff800`40a5de6b : 00000000`00000000 ffffb20b`9acef940 00000000`00000003 ffffc483`f00a0360 : nt!MiWalkPageTablesRecursively+0x88b
ffffc483`f00a0140 fffff800`40a9b991 : ffffc483`f00a02e0 ffffb20b`00000000 ffffca3e`00000002 00000000`00000000 : nt!MiWalkPageTables+0x36b
ffffc483`f00a0240 fffff800`40a6baf0 : 00000000`00000001 ffffc483`00000000 ffffb20b`9acef790 ffffb20b`9455c380 : nt!MiDeletePagablePteRange+0x4f1
ffffc483`f00a0550 fffff800`40e35c99 : ffffb20b`9f21e0a0 00000000`00000000 ffffb20b`00000000 ffffb20b`00000000 : nt!MiDeleteVad+0x360
ffffc483`f00a0660 fffff800`40e35330 : ffffb20b`9f21e0a0 ffffb20b`9125c010 ffffb20b`9455c380 00000000`00000000 : nt!MiUnmapVad+0x49
ffffc483`f00a0690 fffff800`40e335ff : ffffb20b`9f21b260 ffffb20b`9f21b260 ffffb20b`9f21e0a0 ffffb20b`9acef2c0 : nt!MiCleanVad+0x30
ffffc483`f00a06c0 fffff800`40e5d6e4 : ffffffff`00000000 ffffffff`ffffffff 00000000`00000001 ffffb20b`9acef2c0 : nt!MmCleanProcessAddressSpace+0x137
ffffc483`f00a0740 fffff800`40f06596 : ffffb20b`9acef2c0 ffffcb80`a4b81060 ffffc483`f00a0990 00000000`00000000 : nt!PspRundownSingleProcess+0x20c
ffffc483`f00a07d0 fffff800`40ed22e8 : 00000000`00000000 ffffb20b`9acef201 00000000`00000001 000000c6`30588000 : nt!PspExitThread+0x5f6
ffffc483`f00a08d0 fffff800`40a67fb7 : 00000000`00000000 fffff800`40a65b77 00000000`00000000 00000000`00000000 : nt!KiSchedulerApcTerminate+0x38
ffffc483`f00a0910 fffff800`40bf9d20 : 00000000`00000000 ffffc483`f00a09c0 ffffb20b`0000000f 00000000`00000000 : nt!KiDeliverApc+0x487
ffffc483`f00a09c0 fffff800`40c0725f : 00000000`00002650 00000000`00000000 00000000`00000000 ffffb20b`00000000 : nt!KiInitiateUserApc+0x70
ffffc483`f00a0b00 00007ff8`e7b0f9a4 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceExit+0x9f
000000c6`36dff9b8 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ff8`e7b0f9a4
SYMBOL_NAME: nt!MiDeletePteRun+17da
MODULE_NAME: nt
STACK_COMMAND: .thread ; .cxr ; kb
IMAGE_NAME: ntkrnlmp.exe
BUCKET_ID_FUNC_OFFSET: 17da
FAILURE_BUCKET_ID: 0x1a_41790_nt!MiDeletePteRun
OS_VERSION: 10.0.19041.1
BUILDLAB_STR: vb_release
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {27ce5d5a-97b1-faf0-183f-c86809269d56}
Followup: MachineOwner
---------
PC components:
CPU: Ryzen 7 3700X
Motherboard: Asus ROG Strix X570-i
RAM: Corsair 2 x 16gb 3200 Mhz (Model: Corsair CMW32GX4M2C3200C16)
PSU: Thermaltake Toughpower GF1 750W 80+ Gold
SSD: Sabrent Rocket 1TBGPU: Gigabyte RTX 2070 Super
Continue reading...