PAGE_FAULT_IN_NONPAGED_AREA (50)
Invalid system memory was referenced. This cannot be protected by try-except.
Typically the address is just plain bad or it is pointing at freed memory.
Arguments:
Arg1: ffff830000000000, memory referenced.
Arg2: 0000000000000000, value 0 = read operation, 1 = write operation.
Arg3: 0000000000000000, If non-zero, the instruction address which referenced the bad memory
address.
Arg4: 0000000000000006, (reserved)
Debugging Details:
------------------
Could not read faulting driver name
*** WARNING: Unable to verify timestamp for win32k.sys
KEY_VALUES_STRING: 1
Key : Analysis.CPU.Sec
Value: 2
Key : Analysis.DebugAnalysisProvider.CPP
Value: Create: 8007007e on DESKTOP-G25IS1E
Key : Analysis.DebugData
Value: CreateObject
Key : Analysis.DebugModel
Value: CreateObject
Key : Analysis.Elapsed.Sec
Value: 9
Key : Analysis.Memory.CommitPeak.Mb
Value: 69
Key : Analysis.System
Value: CreateObject
ADDITIONAL_XML: 1
BUGCHECK_CODE: 50
BUGCHECK_P1: ffff830000000000
BUGCHECK_P2: 0
BUGCHECK_P3: 0
BUGCHECK_P4: 6
READ_ADDRESS: fffff8050d7733b8: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
fffff8050d62a3c8: Unable to get Flags value from nt!KdVersionBlock
fffff8050d62a3c8: Unable to get Flags value from nt!KdVersionBlock
unable to get nt!MmSpecialPagesInUse
ffff830000000000
MM_INTERNAL_CODE: 6
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXPNP: 1 (!blackboxpnp)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: System
TRAP_FRAME: fffff90e8666f7f0 -- (.trap 0xfffff90e8666f7f0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000000 rbx=0000000000000000 rcx=ffff830000000000
rdx=0000000000000002 rsi=0000000000000000 rdi=0000000000000000
rip=fffff8050d26e410 rsp=fffff90e8666f988 rbp=0000000000000004
r8=ffff830000000000 r9=ffff8341a0c00000 r10=0000000000000002
r11=ffff8341a0d067f8 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei pl zr na po nc
nt!MI_READ_PTE_LOCK_FREE:
fffff805`0d26e410 488b01 mov rax,qword ptr [rcx] ds:ffff8300`00000000=????????????????
Resetting default scope
STACK_TEXT:
fffff90e`8666f448 fffff805`0d42d640 : 00000000`00000050 ffff8300`00000000 00000000`00000000 ffff8341`a0c00000 : nt!KeBugCheckEx
fffff90e`8666f450 fffff805`0d2739bc : ffff837f`ffffffff 00000000`00000000 ffff8300`00000000 00000000`00000000 : nt!MiInPagePageTable+0x16c750
fffff90e`8666f5a0 fffff805`0d272cee : ffffe00f`918b6040 00000000`00000000 00000000`00000001 ffff8300`00000000 : nt!MiUserFault+0x7dc
fffff90e`8666f650 fffff805`0d3cf520 : ffffb781`8d541180 00000000`00000130 00000000`00000100 ffffe00f`918b6040 : nt!MmAccessFault+0x14e
fffff90e`8666f7f0 fffff805`0d26e410 : fffff805`0d2f5244 ffffe00f`918b6140 fffff805`0d23c7bd ffffb781`8d200180 : nt!KiPageFault+0x360
fffff90e`8666f988 fffff805`0d2f5244 : ffffe00f`918b6140 fffff805`0d23c7bd ffffb781`8d200180 00000000`fffffffe : nt!MI_READ_PTE_LOCK_FREE
fffff90e`8666f990 fffff805`0d2f5152 : 00000000`00000001 00000000`00000000 ffffc889`a3a43510 fffff805`0d78f240 : nt!MiMappingHasIoTracker+0x44
fffff90e`8666f9c0 fffff805`563eb981 : ffffe00f`925fc000 ffffe00f`918b6180 fffff805`563ef1c8 00000000`00000004 : nt!MmUnmapIoSpace+0x62
fffff90e`8666faf0 ffffe00f`925fc000 : ffffe00f`918b6180 fffff805`563ef1c8 00000000`00000004 00000000`00320030 : kerneld+0xb981
fffff90e`8666faf8 ffffe00f`918b6180 : fffff805`563ef1c8 00000000`00000004 00000000`00320030 fffff805`563ec160 : 0xffffe00f`925fc000
fffff90e`8666fb00 fffff805`563ef1c8 : 00000000`00000004 00000000`00320030 fffff805`563ec160 fffff90e`8995d750 : 0xffffe00f`918b6180
fffff90e`8666fb08 00000000`00000004 : 00000000`00320030 fffff805`563ec160 fffff90e`8995d750 fffff805`0d9ff651 : kerneld+0xf1c8
fffff90e`8666fb10 00000000`00320030 : fffff805`563ec160 fffff90e`8995d750 fffff805`0d9ff651 ffffe00f`918b6040 : 0x4
fffff90e`8666fb18 fffff805`563ec160 : fffff90e`8995d750 fffff805`0d9ff651 ffffe00f`918b6040 fffff805`0d9101b0 : 0x320030
fffff90e`8666fb20 fffff90e`8995d750 : fffff805`0d9ff651 ffffe00f`918b6040 fffff805`0d9101b0 00000000`00000100 : kerneld+0xc160
fffff90e`8666fb28 fffff805`0d9ff651 : ffffe00f`918b6040 fffff805`0d9101b0 00000000`00000100 ffffe00f`8ea54a78 : 0xfffff90e`8995d750
fffff90e`8666fb30 fffff805`0d2bd095 : ffffe00f`89117ab0 ffffe00f`89117a00 ffffe00f`918b6040 ffffe00f`8bbce860 : nt!IopLoadUnloadDriver+0xef4a1
fffff90e`8666fb70 fffff805`0d32a7a5 : ffffe00f`918b6040 00000000`00000080 ffffe00f`8908c040 ffff86c8`00000001 : nt!ExpWorkerThread+0x105
fffff90e`8666fc10 fffff805`0d3c8b2a : fffff805`092d6180 ffffe00f`918b6040 fffff805`0d32a750 00000000`00000000 : nt!PspSystemThreadStartup+0x55
fffff90e`8666fc60 00000000`00000000 : fffff90e`86670000 fffff90e`8666a000 00000000`00000000 00000000`00000000 : nt!KiStartSystemThread+0x2a
SYMBOL_NAME: kerneld+b981
MODULE_NAME: kerneld
IMAGE_NAME: kerneld.x64
STACK_COMMAND: .thread ; .cxr ; kb
BUCKET_ID_FUNC_OFFSET: b981
FAILURE_BUCKET_ID: AV_R_INVALID_kerneld!unknown_function
OS_VERSION: 10.0.18362.1
BUILDLAB_STR: 19h1_release
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {7e10fa66-c5e3-20c3-421e-2ac8750f89c9}
Followup: MachineOwner
---------
PAGE_FAULT_IN_NONPAGED_AREA (50)
Invalid system memory was referenced. This cannot be protected by try-except.
Typically the address is just plain bad or it is pointing at freed memory.
Arguments:
Arg1: ffffc68000000000, memory referenced.
Arg2: 0000000000000000, value 0 = read operation, 1 = write operation.
Arg3: 0000000000000000, If non-zero, the instruction address which referenced the bad memory
address.
Arg4: 0000000000000006, (reserved)
Debugging Details:
------------------
Could not read faulting driver name
*** WARNING: Unable to verify timestamp for win32k.sys
KEY_VALUES_STRING: 1
Key : Analysis.CPU.Sec
Value: 3
Key : Analysis.DebugAnalysisProvider.CPP
Value: Create: 8007007e on DESKTOP-G25IS1E
Key : Analysis.DebugData
Value: CreateObject
Key : Analysis.DebugModel
Value: CreateObject
Key : Analysis.Elapsed.Sec
Value: 7
Key : Analysis.Memory.CommitPeak.Mb
Value: 68
Key : Analysis.System
Value: CreateObject
ADDITIONAL_XML: 1
BUGCHECK_CODE: 50
BUGCHECK_P1: ffffc68000000000
BUGCHECK_P2: 0
BUGCHECK_P3: 0
BUGCHECK_P4: 6
READ_ADDRESS: fffff80264f733b8: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
fffff80264e2a3c8: Unable to get Flags value from nt!KdVersionBlock
fffff80264e2a3c8: Unable to get Flags value from nt!KdVersionBlock
unable to get nt!MmSpecialPagesInUse
ffffc68000000000
MM_INTERNAL_CODE: 6
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXPNP: 1 (!blackboxpnp)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: System
TRAP_FRAME: ffffb286087567f0 -- (.trap 0xffffb286087567f0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000000 rbx=0000000000000000 rcx=ffffc68000000000
rdx=0000000000000002 rsi=0000000000000000 rdi=0000000000000000
rip=fffff80264a6e410 rsp=ffffb28608756988 rbp=0000000000000004
r8=ffffc68000000000 r9=ffffc6e371a00000 r10=0000000000000002
r11=ffffc6e371b8d7f8 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei pl zr na po nc
nt!MI_READ_PTE_LOCK_FREE:
fffff802`64a6e410 488b01 mov rax,qword ptr [rcx] ds:ffffc680`00000000=????????????????
Resetting default scope
STACK_TEXT:
ffffb286`08756448 fffff802`64c2d640 : 00000000`00000050 ffffc680`00000000 00000000`00000000 ffffc6e3`71a00000 : nt!KeBugCheckEx
ffffb286`08756450 fffff802`64a739bc : ffffc6ff`ffffffff ffffb685`d37bcb90 ffffc680`00000000 fffff802`6495ec53 : nt!MiInPagePageTable+0x16c750
ffffb286`087565a0 fffff802`64a72cee : 00000001`ffffffff 00000000`00000000 00000000`00000001 ffffc680`00000000 : nt!MiUserFault+0x7dc
ffffb286`08756650 fffff802`64bcf520 : ffffb685`d193d040 00000000`000001ee 00000000`00000700 ffffb685`c9282040 : nt!MmAccessFault+0x14e
ffffb286`087567f0 fffff802`64a6e410 : fffff802`64af5244 ffffb685`d193d140 fffff802`64a3c7bd ffffa181`1a600180 : nt!KiPageFault+0x360
ffffb286`08756988 fffff802`64af5244 : ffffb685`d193d140 fffff802`64a3c7bd ffffa181`1a600180 00000000`fffffffe : nt!MI_READ_PTE_LOCK_FREE
ffffb286`08756990 fffff802`64af5152 : 00000000`00000001 00000000`00000000 00000000`00000001 fffff802`64f8f240 : nt!MiMappingHasIoTracker+0x44
ffffb286`087569c0 fffff802`7420b981 : ffffb685`d37bcb00 ffffb685`d193d180 fffff802`7420f1c8 00000000`00000004 : nt!MmUnmapIoSpace+0x62
ffffb286`08756af0 ffffb685`d37bcb00 : ffffb685`d193d180 fffff802`7420f1c8 00000000`00000004 00000000`00320030 : kerneld+0xb981
ffffb286`08756af8 ffffb685`d193d180 : fffff802`7420f1c8 00000000`00000004 00000000`00320030 fffff802`7420c160 : 0xffffb685`d37bcb00
ffffb286`08756b00 fffff802`7420f1c8 : 00000000`00000004 00000000`00320030 fffff802`7420c160 ffffb286`08637750 : 0xffffb685`d193d180
ffffb286`08756b08 00000000`00000004 : 00000000`00320030 fffff802`7420c160 ffffb286`08637750 fffff802`651ff651 : kerneld+0xf1c8
ffffb286`08756b10 00000000`00320030 : fffff802`7420c160 ffffb286`08637750 fffff802`651ff651 ffffb685`d193d040 : 0x4
ffffb286`08756b18 fffff802`7420c160 : ffffb286`08637750 fffff802`651ff651 ffffb685`d193d040 fffff802`651101b0 : 0x320030
ffffb286`08756b20 ffffb286`08637750 : fffff802`651ff651 ffffb685`d193d040 fffff802`651101b0 00000000`00000700 : kerneld+0xc160
ffffb286`08756b28 fffff802`651ff651 : ffffb685`d193d040 fffff802`651101b0 00000000`00000700 fffff802`64e65a00 : 0xffffb286`08637750
ffffb286`08756b30 fffff802`64abd095 : ffffb685`c938fc50 fffff802`65023d00 ffffb685`d193d040 ffffb685`d3dcdaf0 : nt!IopLoadUnloadDriver+0xef4a1
ffffb286`08756b70 fffff802`64b2a7a5 : ffffb685`d193d040 00000000`00000080 ffffb685`c9282040 004e005c`00000001 : nt!ExpWorkerThread+0x105
ffffb286`08756c10 fffff802`64bc8b2a : ffffa181`1a548180 ffffb685`d193d040 fffff802`64b2a750 0077006f`0064006e : nt!PspSystemThreadStartup+0x55
ffffb286`08756c60 00000000`00000000 : ffffb286`08757000 ffffb286`08751000 00000000`00000000 00000000`00000000 : nt!KiStartSystemThread+0x2a
SYMBOL_NAME: kerneld+b981
MODULE_NAME: kerneld
IMAGE_NAME: kerneld.x64
STACK_COMMAND: .thread ; .cxr ; kb
BUCKET_ID_FUNC_OFFSET: b981
FAILURE_BUCKET_ID: AV_R_INVALID_kerneld!unknown_function
OS_VERSION: 10.0.18362.1
BUILDLAB_STR: 19h1_release
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {7e10fa66-c5e3-20c3-421e-2ac8750f89c9}
Followup: MachineOwner
---------
PAGE_FAULT_IN_NONPAGED_AREA (50)
Invalid system memory was referenced. This cannot be protected by try-except.
Typically the address is just plain bad or it is pointing at freed memory.
Arguments:
Arg1: ffffee0000000000, memory referenced.
Arg2: 0000000000000000, value 0 = read operation, 1 = write operation.
Arg3: 0000000000000000, If non-zero, the instruction address which referenced the bad memory
address.
Arg4: 0000000000000006, (reserved)
Debugging Details:
------------------
Could not read faulting driver name
*** WARNING: Unable to verify timestamp for win32k.sys
KEY_VALUES_STRING: 1
Key : Analysis.CPU.Sec
Value: 2
Key : Analysis.DebugAnalysisProvider.CPP
Value: Create: 8007007e on DESKTOP-G25IS1E
Key : Analysis.DebugData
Value: CreateObject
Key : Analysis.DebugModel
Value: CreateObject
Key : Analysis.Elapsed.Sec
Value: 36
Key : Analysis.Memory.CommitPeak.Mb
Value: 69
Key : Analysis.System
Value: CreateObject
ADDITIONAL_XML: 1
BUGCHECK_CODE: 50
BUGCHECK_P1: ffffee0000000000
BUGCHECK_P2: 0
BUGCHECK_P3: 0
BUGCHECK_P4: 6
READ_ADDRESS: fffff8017f3733b8: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
fffff8017f22a3c8: Unable to get Flags value from nt!KdVersionBlock
fffff8017f22a3c8: Unable to get Flags value from nt!KdVersionBlock
unable to get nt!MmSpecialPagesInUse
ffffee0000000000
MM_INTERNAL_CODE: 6
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXPNP: 1 (!blackboxpnp)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: System
TRAP_FRAME: ffff920736e3e7f0 -- (.trap 0xffff920736e3e7f0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000000 rbx=0000000000000000 rcx=ffffee0000000000
rdx=0000000000000002 rsi=0000000000000000 rdi=0000000000000000
rip=fffff8017eec46d0 rsp=ffff920736e3e988 rbp=0000000000000004
r8=ffffee0000000000 r9=ffffee773b800000 r10=0000000000000002
r11=ffffee773b9dc7f8 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei pl zr na po nc
nt!MI_READ_PTE_LOCK_FREE:
fffff801`7eec46d0 488b01 mov rax,qword ptr [rcx] ds:ffffee00`00000000=????????????????
Resetting default scope
STACK_TEXT:
ffff9207`36e3e448 fffff801`7f05860a : 00000000`00000050 ffffee00`00000000 00000000`00000000 ffffee77`3b800000 : nt!KeBugCheckEx
ffff9207`36e3e450 fffff801`7eec9c7c : ffffee7f`ffffffff fffff801`8c0b4f40 ffffee00`00000000 fffff801`7f8b8d03 : nt!MiInPagePageTable+0x1603fa
ffff9207`36e3e5a0 fffff801`7eec8fae : 00000001`ffffffff 00000000`00000000 00000000`00000001 ffffee00`00000000 : nt!MiUserFault+0x7dc
ffff9207`36e3e650 fffff801`7efd041e : ffffc981`efc80180 00000000`000001a2 00000000`00000300 ffff8081`8fdf5040 : nt!MmAccessFault+0x14e
ffff9207`36e3e7f0 fffff801`7eec46d0 : fffff801`7ee199b4 ffff8081`8fdf5140 fffff801`7ef1507d ffffc981`efbd5180 : nt!KiPageFault+0x35e
ffff9207`36e3e988 fffff801`7ee199b4 : ffff8081`8fdf5140 fffff801`7ef1507d ffffc981`efbd5180 00000000`fffffffe : nt!MI_READ_PTE_LOCK_FREE
ffff9207`36e3e990 fffff801`7ee198c2 : 00000000`00000001 00000000`00000000 00000000`00000001 fffff801`7f38f240 : nt!MiMappingHasIoTracker+0x44
ffff9207`36e3e9c0 fffff801`c812b981 : 00000000`00000000 ffff8081`8fdf5180 fffff801`c812f1c8 00000000`00000004 : nt!MmUnmapIoSpace+0x62
ffff9207`36e3eaf0 00000000`00000000 : ffff8081`8fdf5180 fffff801`c812f1c8 00000000`00000004 00000000`00320030 : kerneld+0xb981
SYMBOL_NAME: kerneld+b981
MODULE_NAME: kerneld
IMAGE_NAME: kerneld.x64
STACK_COMMAND: .thread ; .cxr ; kb
BUCKET_ID_FUNC_OFFSET: b981
FAILURE_BUCKET_ID: AV_R_INVALID_kerneld!unknown_function
OS_VERSION: 10.0.18362.1
BUILDLAB_STR: 19h1_release
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {7e10fa66-c5e3-20c3-421e-2ac8750f89c9}
Followup: MachineOwner
---------
PAGE_FAULT_IN_NONPAGED_AREA (50)
Invalid system memory was referenced. This cannot be protected by try-except.
Typically the address is just plain bad or it is pointing at freed memory.
Arguments:
Arg1: ffff890000000000, memory referenced.
Arg2: 0000000000000000, value 0 = read operation, 1 = write operation.
Arg3: 0000000000000000, If non-zero, the instruction address which referenced the bad memory
address.
Arg4: 0000000000000006, (reserved)
Debugging Details:
------------------
Could not read faulting driver name
*** WARNING: Unable to verify timestamp for win32k.sys
KEY_VALUES_STRING: 1
Key : Analysis.CPU.Sec
Value: 2
Key : Analysis.DebugAnalysisProvider.CPP
Value: Create: 8007007e on DESKTOP-G25IS1E
Key : Analysis.DebugData
Value: CreateObject
Key : Analysis.DebugModel
Value: CreateObject
Key : Analysis.Elapsed.Sec
Value: 37
Key : Analysis.Memory.CommitPeak.Mb
Value: 68
Key : Analysis.System
Value: CreateObject
ADDITIONAL_XML: 1
BUGCHECK_CODE: 50
BUGCHECK_P1: ffff890000000000
BUGCHECK_P2: 0
BUGCHECK_P3: 0
BUGCHECK_P4: 6
READ_ADDRESS: fffff803519733b8: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
fffff8035182a3c8: Unable to get Flags value from nt!KdVersionBlock
fffff8035182a3c8: Unable to get Flags value from nt!KdVersionBlock
unable to get nt!MmSpecialPagesInUse
ffff890000000000
MM_INTERNAL_CODE: 6
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXPNP: 1 (!blackboxpnp)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: System
TRAP_FRAME: ffffa300ba3e27f0 -- (.trap 0xffffa300ba3e27f0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000000 rbx=0000000000000000 rcx=ffff890000000000
rdx=0000000000000002 rsi=0000000000000000 rdi=0000000000000000
rip=fffff8035146e410 rsp=ffffa300ba3e2988 rbp=0000000000000004
r8=ffff890000000000 r9=ffff8944a2400000 r10=0000000000000002
r11=ffff8944a25127f8 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei pl zr na po nc
nt!MI_READ_PTE_LOCK_FREE:
fffff803`5146e410 488b01 mov rax,qword ptr [rcx] ds:ffff8900`00000000=????????????????
Resetting default scope
STACK_TEXT:
ffffa300`ba3e2448 fffff803`5162d640 : 00000000`00000050 ffff8900`00000000 00000000`00000000 ffff8944`a2400000 : nt!KeBugCheckEx
ffffa300`ba3e2450 fffff803`514739bc : ffff897f`ffffffff fffff803`60284f40 ffff8900`00000000 ffffbd86`6a041d10 : nt!MiInPagePageTable+0x16c750
ffffa300`ba3e25a0 fffff803`51472cee : 00000000`ff070000 00000000`00000000 00000000`00000001 ffff8900`00000000 : nt!MiUserFault+0x7dc
ffffa300`ba3e2650 fffff803`515cf520 : ffffbd86`68fd7040 00000000`000002d2 00000000`00000000 ffffbd86`5ea82040 : nt!MmAccessFault+0x14e
ffffa300`ba3e27f0 fffff803`5146e410 : fffff803`514f5244 ffffbd86`68fd7140 fffff803`5143c7bd ffffe680`b229b180 : nt!KiPageFault+0x360
ffffa300`ba3e2988 fffff803`514f5244 : ffffbd86`68fd7140 fffff803`5143c7bd ffffe680`b229b180 00000000`fffffffe : nt!MI_READ_PTE_LOCK_FREE
ffffa300`ba3e2990 fffff803`514f5152 : 00000000`00000001 00000000`00000000 00000000`00000000 fffff803`5198f240 : nt!MiMappingHasIoTracker+0x44
ffffa300`ba3e29c0 fffff803`61d4b981 : 00000000`00000000 ffffbd86`68fd7180 fffff803`61d4f1c8 00000000`00000004 : nt!MmUnmapIoSpace+0x62
ffffa300`ba3e2af0 00000000`00000000 : ffffbd86`68fd7180 fffff803`61d4f1c8 00000000`00000004 00000000`00320030 : kerneld+0xb981
SYMBOL_NAME: kerneld+b981
MODULE_NAME: kerneld
IMAGE_NAME: kerneld.x64
STACK_COMMAND: .thread ; .cxr ; kb
BUCKET_ID_FUNC_OFFSET: b981
FAILURE_BUCKET_ID: AV_R_INVALID_kerneld!unknown_function
OS_VERSION: 10.0.18362.1
BUILDLAB_STR: 19h1_release
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {7e10fa66-c5e3-20c3-421e-2ac8750f89c9}
Followup: MachineOwner
PAGE_FAULT_IN_NONPAGED_AREA (50)
Invalid system memory was referenced. This cannot be protected by try-except.
Typically the address is just plain bad or it is pointing at freed memory.
Arguments:
Arg1: fffffa8000000000, memory referenced.
Arg2: 0000000000000000, value 0 = read operation, 1 = write operation.
Arg3: 0000000000000000, If non-zero, the instruction address which referenced the bad memory
address.
Arg4: 0000000000000006, (reserved)
Debugging Details:
------------------
Could not read faulting driver name
*** WARNING: Unable to verify timestamp for win32k.sys
KEY_VALUES_STRING: 1
Key : Analysis.CPU.Sec
Value: 3
Key : Analysis.DebugAnalysisProvider.CPP
Value: Create: 8007007e on DESKTOP-G25IS1E
Key : Analysis.DebugData
Value: CreateObject
Key : Analysis.DebugModel
Value: CreateObject
Key : Analysis.Elapsed.Sec
Value: 8
Key : Analysis.Memory.CommitPeak.Mb
Value: 68
Key : Analysis.System
Value: CreateObject
ADDITIONAL_XML: 1
BUGCHECK_CODE: 50
BUGCHECK_P1: fffffa8000000000
BUGCHECK_P2: 0
BUGCHECK_P3: 0
BUGCHECK_P4: 6
READ_ADDRESS: fffff807429733b8: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
fffff8074282a3c8: Unable to get Flags value from nt!KdVersionBlock
fffff8074282a3c8: Unable to get Flags value from nt!KdVersionBlock
unable to get nt!MmSpecialPagesInUse
fffffa8000000000
MM_INTERNAL_CODE: 6
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXPNP: 1 (!blackboxpnp)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: System
TRAP_FRAME: ffffc78ddcb857f0 -- (.trap 0xffffc78ddcb857f0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000000 rbx=0000000000000000 rcx=fffffa8000000000
rdx=0000000000000002 rsi=0000000000000000 rdi=0000000000000000
rip=fffff807424c46d0 rsp=ffffc78ddcb85988 rbp=0000000000000004
r8=fffffa8000000000 r9=fffffafd7ea00000 r10=0000000000000002
r11=fffffafd7ebf57f8 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei pl zr na po nc
nt!MI_READ_PTE_LOCK_FREE:
fffff807`424c46d0 488b01 mov rax,qword ptr [rcx] ds:fffffa80`00000000=????????????????
Resetting default scope
STACK_TEXT:
ffffc78d`dcb85448 fffff807`4265860a : 00000000`00000050 fffffa80`00000000 00000000`00000000 fffffafd`7ea00000 : nt!KeBugCheckEx
ffffc78d`dcb85450 fffff807`424c9c7c : fffffaff`ffffffff fffff807`51a24f40 fffffa80`00000000 fffff807`4235dd03 : nt!MiInPagePageTable+0x1603fa
ffffc78d`dcb855a0 fffff807`424c8fae : 00000001`ffffffff 00000000`00000000 00000000`00000001 fffffa80`00000000 : nt!MiUserFault+0x7dc
ffffc78d`dcb85650 fffff807`425d041e : ffffcd07`f7670040 00000000`000001ee 00000000`00000100 ffffcd07`ece82040 : nt!MmAccessFault+0x14e
ffffc78d`dcb857f0 fffff807`424c46d0 : fffff807`424199b4 ffffc78d`dc4fb750 fffff807`425c43d5 ffffcd07`f7670040 : nt!KiPageFault+0x35e
ffffc78d`dcb85988 fffff807`424199b4 : ffffc78d`dc4fb750 fffff807`425c43d5 ffffcd07`f7670040 ffffc78d`dcb85a20 : nt!MI_READ_PTE_LOCK_FREE
ffffc78d`dcb85990 fffff807`424198c2 : 00000000`00000001 00000000`00000000 fffff807`4dd9b8d8 ffffcd07`f6406e30 : nt!MiMappingHasIoTracker+0x44
ffffc78d`dcb859c0 fffff807`4dd9b981 : ffffcd07`ece899e0 fffff807`42af7e90 fffff807`4dd9f1c8 00000000`00000004 : nt!MmUnmapIoSpace+0x62
ffffc78d`dcb85af0 ffffcd07`ece899e0 : fffff807`42af7e90 fffff807`4dd9f1c8 00000000`00000004 00000000`00320030 : kerneld+0xb981
ffffc78d`dcb85af8 fffff807`42af7e8f : fffff807`4dd9f1c8 00000000`00000004 00000000`00320030 fffff807`4dd9c160 : 0xffffcd07`ece899e0
ffffc78d`dcb85b00 fffff807`4dd9f1c8 : 00000000`00000004 00000000`00320030 fffff807`4dd9c160 ffffc78d`dc4fb750 : nt!IopOpenRegistryKey+0x57
ffffc78d`dcb85b08 00000000`00000004 : 00000000`00320030 fffff807`4dd9c160 ffffc78d`dc4fb750 fffff807`42bbeecd : kerneld+0xf1c8
ffffc78d`dcb85b10 00000000`00320030 : fffff807`4dd9c160 ffffc78d`dc4fb750 fffff807`42bbeecd ffffcd07`f7670040 : 0x4
ffffc78d`dcb85b18 fffff807`4dd9c160 : ffffc78d`dc4fb750 fffff807`42bbeecd ffffcd07`f7670040 fffff807`42af7e90 : 0x320030
ffffc78d`dcb85b20 ffffc78d`dc4fb750 : fffff807`42bbeecd ffffcd07`f7670040 fffff807`42af7e90 00000000`00000100 : kerneld+0xc160
ffffc78d`dcb85b28 fffff807`42bbeecd : ffffcd07`f7670040 fffff807`42af7e90 00000000`00000100 fffff807`42865a20 : 0xffffc78d`dc4fb750
ffffc78d`dcb85b30 fffff807`424f43b5 : ffffcd07`ece899e0 fffff807`42ac5600 ffffcd07`f7670040 00000000`00000000 : nt!IopLoadUnloadDriver+0xc703d
ffffc78d`dcb85b70 fffff807`4246bcd5 : ffffcd07`f7670040 00000000`00000080 ffffcd07`ece82040 00000067`b4bbbdff : nt!ExpWorkerThread+0x105
ffffc78d`dcb85c10 fffff807`425c9998 : ffffde80`d209b180 ffffcd07`f7670040 fffff807`4246bc80 00000000`00000000 : nt!PspSystemThreadStartup+0x55
ffffc78d`dcb85c60 00000000`00000000 : ffffc78d`dcb86000 ffffc78d`dcb80000 00000000`00000000 00000000`00000000 : nt!KiStartSystemThread+0x28
SYMBOL_NAME: kerneld+b981
MODULE_NAME: kerneld
IMAGE_NAME: kerneld.x64
STACK_COMMAND: .thread ; .cxr ; kb
BUCKET_ID_FUNC_OFFSET: b981
FAILURE_BUCKET_ID: AV_R_INVALID_kerneld!unknown_function
OS_VERSION: 10.0.18362.1
BUILDLAB_STR: 19h1_release
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {7e10fa66-c5e3-20c3-421e-2ac8750f89c9}
Followup: MachineOwner
---------
0: kd> lmvm kerneld
Browse full module list
start end module name
fffff807`4dd90000 fffff807`4dda2000 kerneld T (no symbols)
Loaded symbol image file: kerneld.x64
Image path: \??\D:\FinalWire\AIDA64 Extreme\kerneld.x64
Image name: kerneld.x64
Browse all global symbols functions data
Timestamp: Sun Aug 25 14:43:32 2019 (5D627464)
CheckSum: 000121AC
ImageSize: 00012000
Translations: 0000.04b0 0000.04e4 0409.04b0 0409.04e4
Information from resource tables: