*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
PAGE_FAULT_IN_NONPAGED_AREA (50)
Invalid system memory was referenced. This cannot be protected by try-except.
Typically the address is just plain bad or it is pointing at freed memory.
Arguments:
Arg1: fffffe890aa164f4, memory referenced.
Arg2: 0000000000000002, X64: bit 0 set if the fault was due to a not-present PTE.
bit 1 is set if the fault was due to a write, clear if a read.
bit 3 is set if the processor decided the fault was due to a corrupted PTE.
bit 4 is set if the fault was due to attempted execute of a no-execute PTE.
- ARM64: bit 1 is set if the fault was due to a write, clear if a read.
bit 3 is set if the fault was due to attempted execute of a no-execute PTE.
Arg3: fffff80724e2c145, If non-zero, the instruction address which referenced the bad memory
address.
Arg4: 0000000000000002, (reserved)
Debugging Details:
------------------
KEY_VALUES_STRING: 1
Key : AV.Type
Value: Write
Key : Analysis.CPU.mSec
Value: 2796
Key : Analysis.DebugAnalysisManager
Value: Create
Key : Analysis.Elapsed.mSec
Value: 9477
Key : Analysis.Init.CPU.mSec
Value: 374
Key : Analysis.Init.Elapsed.mSec
Value: 13176
Key : Analysis.Memory.CommitPeak.Mb
Value: 144
Key : Bugcheck.Code.DumpHeader
Value: 0x50
Key : Bugcheck.Code.Register
Value: 0x50
Key : WER.OS.Branch
Value: vb_release
Key : WER.OS.Timestamp
Value: 2019-12-06T14:06:00Z
Key : WER.OS.Version
Value: 10.0.19041.1
FILE_IN_CAB: 092022-5156-01.dmp
BUGCHECK_CODE: 50
BUGCHECK_P1: fffffe890aa164f4
BUGCHECK_P2: 2
BUGCHECK_P3: fffff80724e2c145
BUGCHECK_P4: 2
READ_ADDRESS: fffff807258fb390: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
unable to get nt!MmSpecialPagesInUse
fffffe890aa164f4
MM_INTERNAL_CODE: 2
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: services.exe
TRAP_FRAME: fffffe890aa0c340 -- (.trap 0xfffffe890aa0c340)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=ffffd539eff604fa rbx=0000000000000000 rcx=0000000000000000
rdx=ffff820fff26d8f0 rsi=0000000000000000 rdi=0000000000000000
rip=fffff80724e2c145 rsp=fffffe890aa0c4d0 rbp=0000000000000000
r8=0000000000000002 r9=0000000000000000 r10=fffff80724e2c100
r11=0000000000000001 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei ng nz na po nc
nt!FsRtlCheckOplockEx2+0x45:
fffff807`24e2c145 48898c24a0000000 mov qword ptr [rsp+0A0h],rcx ss:0018:fffffe89`0aa0c570=0000000053c80000
Resetting default scope
STACK_TEXT:
fffffe89`0aa0c098 fffff807`25031a9d : 00000000`00000050 fffffe89`0aa164f4 00000000`00000002 fffffe89`0aa0c340 : nt!KeBugCheckEx
fffffe89`0aa0c0a0 fffff807`24e399e0 : fffffe89`0aa0c598 00000000`00000002 fffffe89`0aa0c3c0 00000000`00000000 : nt!MiSystemFault+0x1da08d
fffffe89`0aa0c1a0 fffff807`2500715e : ffff820f`00000000 ffffd539`eff6019a ffff820f`00000080 00000000`00000000 : nt!MmAccessFault+0x400
fffffe89`0aa0c340 fffff807`24e2c145 : 00000000`00000000 00000000`00000080 ffff820f`fca9e4c0 00000000`00000000 : nt!KiPageFault+0x35e
fffffe89`0aa0c4d0 fffff807`2a86bb2a : ffff820f`ff26dc48 fffffe89`0aa0d0e8 fffffe89`0aa0d0f0 ffff9a8e`53c80170 : nt!FsRtlCheckOplockEx2+0x45
fffffe89`0aa0c640 fffff807`2a86960a : ffff820f`fc00aa28 ffff820f`ff26dc48 ffff820f`f9ab7100 ffff9a8e`53c80470 : Ntfs!NtfsOpenAttribute+0x70a
fffffe89`0aa0c7e0 fffff807`2a869177 : 00000000`00000080 00000000`00000008 fffffe89`0aa0d080 ffff9a8e`00000024 : Ntfs!NtfsOpenExistingAttr+0x1fa
fffffe89`0aa0c8a0 fffff807`2a867b8a : fffffe89`0aa0d080 ffff9a8e`4ee33690 ffff9a8e`53c80010 ffff9a8e`53c80010 : Ntfs!NtfsOpenAttributeInExistingFile+0xae7
fffffe89`0aa0ca90 fffff807`2a81f6ff : ffff820f`fc00aa28 ffff820f`f9ab84f0 ffff9a8e`4ed1d170 00000000`00000001 : Ntfs!NtfsOpenExistingPrefixFcb+0x22a
fffffe89`0aa0cba0 fffff807`2a820600 : ffff820f`fc00aa28 ffff820f`ff26d8f0 ffff820f`fc00aa28 fffffe89`0aa0ce40 : Ntfs!NtfsFindStartingNode+0x3ff
fffffe89`0aa0cc90 fffff807`2a81be9b : ffff820f`ff26d8f0 fffffe89`0aa0d080 ffff820f`ff26d8f0 00000000`00000000 : Ntfs!NtfsCommonCreate+0x580
fffffe89`0aa0cf70 fffff807`24e2a6b5 : ffff820f`f9ab7030 ffff820f`ff26d8f0 fffffe89`0aa0d200 ffff820f`feca1b50 : Ntfs!NtfsFsdCreate+0x1db
fffffe89`0aa0d1f0 fffff807`248470cf : ffff820f`feca1b00 fffffe89`0aa0d2e0 fffffe89`0aa0d2e9 fffff807`24845f3a : nt!IofCallDriver+0x55
fffffe89`0aa0d230 fffff807`24879f54 : fffffe89`0aa0d2e0 ffff820f`feca1ba8 ffff820f`f99a4d20 00000000`00000000 : FLTMGR!FltpLegacyProcessingAfterPreCallbacksCompleted+0x28f
fffffe89`0aa0d2a0 fffff807`24e2a6b5 : ffff820f`feca1b00 ffff820f`f999a8f0 00000000`00000000 00000000`00000000 : FLTMGR!FltpCreate+0x324
fffffe89`0aa0d350 fffff807`24e2bcb4 : 00000000`00000000 ffff820f`ff26d8f0 ffff820f`f9a6a700 ffff820f`f99a4d20 : nt!IofCallDriver+0x55
fffffe89`0aa0d390 fffff807`25215f5d : fffffe89`0aa0d650 ffff820f`f999a8f0 ffff820f`feca1be8 fffffe89`00000001 : nt!IoCallDriverWithTracing+0x34
fffffe89`0aa0d3e0 fffff807`251ff2fe : ffff820f`f999a8f0 00000000`00000000 ffff820f`fca9e4a0 ffff820f`fca9e401 : nt!IopParseDevice+0x117d
fffffe89`0aa0d550 fffff807`25228b2a : ffff820f`fca9e400 fffffe89`0aa0d7b8 ffff820f`00000040 ffff820f`f66f3bc0 : nt!ObpLookupObjectName+0x3fe
fffffe89`0aa0d720 fffff807`252738a5 : fffffe89`00000000 00000070`3151d7e0 00000070`3151dd01 00000070`3151d7b0 : nt!ObOpenObjectByNameEx+0x1fa
fffffe89`0aa0d850 fffff807`2500a9b8 : 00000000`00000000 ffff820f`fe734080 ffff820f`fe7da080 000001a1`239be7e0 : nt!NtQueryAttributesFile+0x1c5
fffffe89`0aa0db00 00007ff9`e3acd7a4 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x28
00000070`3151d738 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ff9`e3acd7a4
SYMBOL_NAME: nt!FsRtlCheckOplockEx2+45
MODULE_NAME: nt
IMAGE_NAME: ntkrnlmp.exe
IMAGE_VERSION: 10.0.19041.2006
STACK_COMMAND: .cxr; .ecxr ; kb
BUCKET_ID_FUNC_OFFSET: 45
FAILURE_BUCKET_ID: AV_W_(null)_nt!FsRtlCheckOplockEx2
OS_VERSION: 10.0.19041.1
BUILDLAB_STR: vb_release
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {c8ac082d-2685-4e94-039f-f7b11bce9de0}
Followup: MachineOwner
---------