Microsoft (R) Windows Debugger Version 10.0.20153.1000 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [C:\Users\Enes3078\AppData\Local\Temp\7zO0BAFB1A2\112120-9718-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
************* Path validation summary **************
Response Time (ms) Location
Deferred srv*
Symbol search path is: srv*
Executable search path is:
Windows 10 Kernel Version 19041 MP (4 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS
Edition build lab: 19041.1.amd64fre.vb_release.191206-1406
Machine Name:
Kernel base = 0xfffff804`0da00000 PsLoadedModuleList = 0xfffff804`0e62a3b0
Debug session time: Sat Nov 21 15:12:30.124 2020 (UTC + 3:00)
System Uptime: 0 days 13:41:29.802
Loading Kernel Symbols
...............................................................
................................................................
................................................................
.........
Loading User Symbols
Loading unloaded module list
........................
For analysis of this file, run !analyze -v
nt!KeBugCheckEx:
fffff804`0ddf5210 48894c2408 mov qword ptr [rsp+8],rcx ss:0018:ffffe583`8f7791d0=0000000000000050
3: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
PAGE_FAULT_IN_NONPAGED_AREA (50)
Invalid system memory was referenced. This cannot be protected by try-except.
Typically the address is just plain bad or it is pointing at freed memory.
Arguments:
Arg1: ffffee80006f56d8, memory referenced.
Arg2: 0000000000000000, value 0 = read operation, 1 = write operation.
Arg3: 0000000000000000, If non-zero, the instruction address which referenced the bad memory
address.
Arg4: 0000000000000006, (reserved)
Debugging Details:
------------------
*** WARNING: Unable to verify timestamp for bcmwl63a.sys
Could not read faulting driver name
*** WARNING: Unable to verify checksum for win32k.sys
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 12468
Key : Analysis.DebugAnalysisProvider.CPP
Value: Create: 8007007e on DESKTOP-70T822T
Key : Analysis.DebugData
Value: CreateObject
Key : Analysis.DebugModel
Value: CreateObject
Key : Analysis.Elapsed.mSec
Value: 72877
Key : Analysis.Memory.CommitPeak.Mb
Value: 91
Key : Analysis.System
Value: CreateObject
Key : WER.OS.Branch
Value: vb_release
Key : WER.OS.Timestamp
Value: 2019-12-06T14:06:00Z
Key : WER.OS.Version
Value: 10.0.19041.1
ADDITIONAL_XML: 1
OS_BUILD_LAYERS: 1
BUGCHECK_CODE: 50
BUGCHECK_P1: ffffee80006f56d8
BUGCHECK_P2: 0
BUGCHECK_P3: 0
BUGCHECK_P4: 6
READ_ADDRESS: fffff8040e6fb390: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
fffff8040e60f340: Unable to get Flags value from nt!KdVersionBlock
fffff8040e60f340: Unable to get Flags value from nt!KdVersionBlock
unable to get nt!MmSpecialPagesInUse
ffffee80006f56d8
MM_INTERNAL_CODE: 6
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXPNP: 1 (!blackboxpnp)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: System
TRAP_FRAME: ffffe5838f779550 -- (.trap 0xffffe5838f779550)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=ffffeef77bbdd000 rbx=0000000000000000 rcx=ffffee80006f56d8
rdx=ffffeef77bbdd000 rsi=0000000000000000 rdi=0000000000000000
rip=fffff8040dd41130 rsp=ffffe5838f7796e8 rbp=ffffeef77bbdd000
r8=ffffeef77ba00018 r9=0000000000000002 r10=0000000000000002
r11=ffffee80006f56d8 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei pl zr na po nc
nt!MI_READ_PTE_LOCK_FREE:
fffff804`0dd41130 488b01 mov rax,qword ptr [rcx] ds:ffffee80`006f56d8=????????????????
Resetting default scope
STACK_TEXT:
ffffe583`8f7791c8 fffff804`0de2121f : 00000000`00000050 ffffee80`006f56d8 00000000`00000000 ffffeef7`7ba00018 : nt!KeBugCheckEx
ffffe583`8f7791d0 fffff804`0dcead67 : 00000000`00000000 00000000`00000000 ffffe583`8f779550 00000000`00000000 : nt!MiInPagePageTable+0x1faa7f
ffffe583`8f779320 fffff804`0dcea20a : ffffc205`2e000000 00000000`00000000 ffffe583`8f7795d0 00000000`00000000 : nt!MiUserFault+0x5e7
ffffe583`8f7793b0 fffff804`0de0335e : ffffc205`2ce021c0 00000000`0000002b ffffc205`2e000020 fffff804`0dc247fb : nt!MmAccessFault+0x16a
ffffe583`8f779550 fffff804`0dd41130 : fffff804`0dc49691 00000000`00000200 00000000`00000000 00000000`002ac660 : nt!KiPageFault+0x35e
ffffe583`8f7796e8 fffff804`0dc49691 : 00000000`00000200 00000000`00000000 00000000`002ac660 fffff804`0e3b1094 : nt!MI_READ_PTE_LOCK_FREE
ffffe583`8f7796f0 fffff804`13a935bd : ffffc205`00000000 fffff804`13b1ce30 00000000`00000000 ffffee80`009a1d08 : nt!MmBuildMdlForNonPagedPool+0x1f1
ffffe583`8f7797b0 fffff804`26a1ea6f : 00000000`00000000 ffffc205`3c35f2c0 ffffc205`34370800 ffffc205`3a96e300 : ndis!NdisAllocateMdl+0x3d
ffffe583`8f7797f0 00000000`00000000 : ffffc205`3c35f2c0 ffffc205`34370800 ffffc205`3a96e300 00000000`00000152 : bcmwl63a+0x8ea6f
SYMBOL_NAME: bcmwl63a+8ea6f
MODULE_NAME: bcmwl63a
IMAGE_NAME: bcmwl63a.sys
STACK_COMMAND: .thread ; .cxr ; kb
BUCKET_ID_FUNC_OFFSET: 8ea6f
FAILURE_BUCKET_ID: AV_R_INVALID_bcmwl63a!unknown_function
OS_VERSION: 10.0.19041.1
BUILDLAB_STR: vb_release
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {d1296efd-0617-c4de-4b82-59e056c62646}
Followup: MachineOwner
---------
Microsoft (R) Windows Debugger Version 10.0.20153.1000 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [C:\Users\Enes3078\AppData\Local\Temp\7zO0BAAA0A2\112220-10875-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
************* Path validation summary **************
Response Time (ms) Location
Deferred srv*
Symbol search path is: srv*
Executable search path is:
Windows 10 Kernel Version 19041 MP (4 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS
Edition build lab: 19041.1.amd64fre.vb_release.191206-1406
Machine Name:
Kernel base = 0xfffff801`81400000 PsLoadedModuleList = 0xfffff801`8202a3b0
Debug session time: Sun Nov 22 15:02:15.949 2020 (UTC + 3:00)
System Uptime: 0 days 23:28:00.205
Loading Kernel Symbols
...............................................................
................................................................
................................................................
............
Loading User Symbols
Loading unloaded module list
...................
For analysis of this file, run !analyze -v
nt!KeBugCheckEx:
fffff801`817f5210 48894c2408 mov qword ptr [rsp+8],rcx ss:0018:ffff840f`95a7d1d0=0000000000000050
1: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
PAGE_FAULT_IN_NONPAGED_AREA (50)
Invalid system memory was referenced. This cannot be protected by try-except.
Typically the address is just plain bad or it is pointing at freed memory.
Arguments:
Arg1: ffffb000006f56d8, memory referenced.
Arg2: 0000000000000000, value 0 = read operation, 1 = write operation.
Arg3: 0000000000000000, If non-zero, the instruction address which referenced the bad memory
address.
Arg4: 0000000000000006, (reserved)
Debugging Details:
------------------
*** WARNING: Unable to verify timestamp for bcmwl63a.sys
Could not read faulting driver name
*** WARNING: Unable to verify checksum for win32k.sys
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 13999
Key : Analysis.DebugAnalysisProvider.CPP
Value: Create: 8007007e on DESKTOP-70T822T
Key : Analysis.DebugData
Value: CreateObject
Key : Analysis.DebugModel
Value: CreateObject
Key : Analysis.Elapsed.mSec
Value: 66655
Key : Analysis.Memory.CommitPeak.Mb
Value: 90
Key : Analysis.System
Value: CreateObject
Key : WER.OS.Branch
Value: vb_release
Key : WER.OS.Timestamp
Value: 2019-12-06T14:06:00Z
Key : WER.OS.Version
Value: 10.0.19041.1
ADDITIONAL_XML: 1
OS_BUILD_LAYERS: 1
BUGCHECK_CODE: 50
BUGCHECK_P1: ffffb000006f56d8
BUGCHECK_P2: 0
BUGCHECK_P3: 0
BUGCHECK_P4: 6
READ_ADDRESS: fffff801820fb390: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
fffff8018200f340: Unable to get Flags value from nt!KdVersionBlock
fffff8018200f340: Unable to get Flags value from nt!KdVersionBlock
unable to get nt!MmSpecialPagesInUse
ffffb000006f56d8
MM_INTERNAL_CODE: 6
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXPNP: 1 (!blackboxpnp)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: System
TRAP_FRAME: ffff840f95a7d550 -- (.trap 0xffff840f95a7d550)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=ffffb0582c160000 rbx=0000000000000000 rcx=ffffb000006f56d8
rdx=ffffb0582c160000 rsi=0000000000000000 rdi=0000000000000000
rip=fffff80181741130 rsp=ffff840f95a7d6e8 rbp=ffffb0582c160000
r8=ffffb0582c000018 r9=0000000000000002 r10=0000000000000002
r11=ffffb000006f56d8 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei pl zr na po nc
nt!MI_READ_PTE_LOCK_FREE:
fffff801`81741130 488b01 mov rax,qword ptr [rcx] ds:ffffb000`006f56d8=????????????????
Resetting default scope
STACK_TEXT:
ffff840f`95a7d1c8 fffff801`8182121f : 00000000`00000050 ffffb000`006f56d8 00000000`00000000 ffffb058`2c000018 : nt!KeBugCheckEx
ffff840f`95a7d1d0 fffff801`816ead67 : 00000000`00000000 00000000`00000000 ffff840f`95a7d550 00000000`00000000 : nt!MiInPagePageTable+0x1faa7f
ffff840f`95a7d320 fffff801`816ea20a : ffffb30f`4e000000 00000000`00000000 ffff840f`95a7d5d0 00000000`00000000 : nt!MiUserFault+0x5e7
ffff840f`95a7d3b0 fffff801`8180335e : ffffb30f`4cc021c0 00000000`0000003b ffffb30f`4e000320 fffff801`816247fb : nt!MmAccessFault+0x16a
ffff840f`95a7d550 fffff801`81741130 : fffff801`81649691 00000000`00000200 00000000`00000000 00000000`003ae3d0 : nt!KiPageFault+0x35e
ffff840f`95a7d6e8 fffff801`81649691 : 00000000`00000200 00000000`00000000 00000000`003ae3d0 fffff801`81db1094 : nt!MI_READ_PTE_LOCK_FREE
ffff840f`95a7d6f0 fffff801`854935bd : ffffb30f`00000000 fffff801`00000001 00000000`00000000 ffffb000`00aa3a78 : nt!MmBuildMdlForNonPagedPool+0x1f1
ffff840f`95a7d7b0 fffff801`92b0ea6f : 00000000`00000000 00000000`0000077e ffffb30f`57e58080 ffffb30f`59e2f040 : ndis!NdisAllocateMdl+0x3d
ffff840f`95a7d7f0 00000000`00000000 : 00000000`0000077e ffffb30f`57e58080 ffffb30f`59e2f040 00000000`000001f6 : bcmwl63a+0x8ea6f
SYMBOL_NAME: bcmwl63a+8ea6f
MODULE_NAME: bcmwl63a
IMAGE_NAME: bcmwl63a.sys
STACK_COMMAND: .thread ; .cxr ; kb
BUCKET_ID_FUNC_OFFSET: 8ea6f
FAILURE_BUCKET_ID: AV_R_INVALID_bcmwl63a!unknown_function
OS_VERSION: 10.0.19041.1
BUILDLAB_STR: vb_release
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {d1296efd-0617-c4de-4b82-59e056c62646}
Followup: MachineOwner
---------
Microsoft (R) Windows Debugger Version 10.0.20153.1000 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [C:\Users\Enes3078\AppData\Local\Temp\7zO0BA6A2A2\112120-9281-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
************* Path validation summary **************
Response Time (ms) Location
Deferred srv*
Symbol search path is: srv*
Executable search path is:
Windows 10 Kernel Version 19041 MP (4 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS
Edition build lab: 19041.1.amd64fre.vb_release.191206-1406
Machine Name:
Kernel base = 0xfffff804`44800000 PsLoadedModuleList = 0xfffff804`4542a3b0
Debug session time: Sat Nov 21 15:33:58.447 2020 (UTC + 3:00)
System Uptime: 0 days 0:20:56.126
Loading Kernel Symbols
...............................................................
................................................................
................................................................
.........
Loading User Symbols
Loading unloaded module list
..........
For analysis of this file, run !analyze -v
nt!KeBugCheckEx:
fffff804`44bf5210 48894c2408 mov qword ptr [rsp+8],rcx ss:0018:fffffb0e`74c8b1d0=0000000000000050
2: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
PAGE_FAULT_IN_NONPAGED_AREA (50)
Invalid system memory was referenced. This cannot be protected by try-except.
Typically the address is just plain bad or it is pointing at freed memory.
Arguments:
Arg1: fffff400006f56d8, memory referenced.
Arg2: 0000000000000000, value 0 = read operation, 1 = write operation.
Arg3: 0000000000000000, If non-zero, the instruction address which referenced the bad memory
address.
Arg4: 0000000000000006, (reserved)
Debugging Details:
------------------
*** WARNING: Unable to verify timestamp for bcmwl63a.sys
Could not read faulting driver name
*** WARNING: Unable to verify checksum for win32k.sys
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 13796
Key : Analysis.DebugAnalysisProvider.CPP
Value: Create: 8007007e on DESKTOP-70T822T
Key : Analysis.DebugData
Value: CreateObject
Key : Analysis.DebugModel
Value: CreateObject
Key : Analysis.Elapsed.mSec
Value: 95553
Key : Analysis.Memory.CommitPeak.Mb
Value: 89
Key : Analysis.System
Value: CreateObject
Key : WER.OS.Branch
Value: vb_release
Key : WER.OS.Timestamp
Value: 2019-12-06T14:06:00Z
Key : WER.OS.Version
Value: 10.0.19041.1
ADDITIONAL_XML: 1
OS_BUILD_LAYERS: 1
BUGCHECK_CODE: 50
BUGCHECK_P1: fffff400006f56d8
BUGCHECK_P2: 0
BUGCHECK_P3: 0
BUGCHECK_P4: 6
READ_ADDRESS: fffff804454fb390: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
fffff8044540f340: Unable to get Flags value from nt!KdVersionBlock
fffff8044540f340: Unable to get Flags value from nt!KdVersionBlock
unable to get nt!MmSpecialPagesInUse
fffff400006f56d8
MM_INTERNAL_CODE: 6
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXPNP: 1 (!blackboxpnp)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: System
TRAP_FRAME: fffffb0e74c8b550 -- (.trap 0xfffffb0e74c8b550)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=fffff47a3d1e8000 rbx=0000000000000000 rcx=fffff400006f56d8
rdx=fffff47a3d1e8000 rsi=0000000000000000 rdi=0000000000000000
rip=fffff80444b41130 rsp=fffffb0e74c8b6e8 rbp=fffff47a3d1e8000
r8=fffff47a3d000018 r9=0000000000000002 r10=0000000000000002
r11=fffff400006f56d8 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei pl zr na po nc
nt!MI_READ_PTE_LOCK_FREE:
fffff804`44b41130 488b01 mov rax,qword ptr [rcx] ds:fffff400`006f56d8=????????????????
Resetting default scope
STACK_TEXT:
fffffb0e`74c8b1c8 fffff804`44c2121f : 00000000`00000050 fffff400`006f56d8 00000000`00000000 fffff47a`3d000018 : nt!KeBugCheckEx
fffffb0e`74c8b1d0 fffff804`44aead67 : 00000000`00000000 00000000`00000000 fffffb0e`74c8b550 00000000`00000000 : nt!MiInPagePageTable+0x1faa7f
fffffb0e`74c8b320 fffff804`44aea20a : ffffb58f`a5000000 00000000`00000000 fffffb0e`74c8b5d0 00000000`00000000 : nt!MiUserFault+0x5e7
fffffb0e`74c8b3b0 fffff804`44c0335e : ffffb58f`a46021c0 00000000`00000066 ffffb58f`a5000020 fffff804`44a247fb : nt!MmAccessFault+0x16a
fffffb0e`74c8b550 fffff804`44b41130 : fffff804`44a49691 00000000`00000200 00000000`00000000 00000000`0065d328 : nt!KiPageFault+0x35e
fffffb0e`74c8b6e8 fffff804`44a49691 : 00000000`00000200 00000000`00000000 00000000`0065d328 fffff804`451b1094 : nt!MI_READ_PTE_LOCK_FREE
fffffb0e`74c8b6f0 fffff804`470935bd : ffffb58f`00000000 fffff804`4711ce30 00000000`00000000 fffff400`00d529d0 : nt!MmBuildMdlForNonPagedPool+0x1f1
fffffb0e`74c8b7b0 fffff804`54a5ea6f : 00000000`00000000 ffffb58f`b04659b0 ffffb58f`aa52a800 ffffb58f`a65ce080 : ndis!NdisAllocateMdl+0x3d
fffffb0e`74c8b7f0 00000000`00000000 : ffffb58f`b04659b0 ffffb58f`aa52a800 ffffb58f`a65ce080 00000000`000000a4 : bcmwl63a+0x8ea6f
SYMBOL_NAME: bcmwl63a+8ea6f
MODULE_NAME: bcmwl63a
IMAGE_NAME: bcmwl63a.sys
STACK_COMMAND: .thread ; .cxr ; kb
BUCKET_ID_FUNC_OFFSET: 8ea6f
FAILURE_BUCKET_ID: AV_R_INVALID_bcmwl63a!unknown_function
OS_VERSION: 10.0.19041.1
BUILDLAB_STR: vb_release
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {d1296efd-0617-c4de-4b82-59e056c62646}
Followup: MachineOwner
---------
Microsoft (R) Windows Debugger Version 10.0.20153.1000 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [C:\Users\Enes3078\AppData\Local\Temp\7zO0BAE43A2\112120-10109-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
************* Path validation summary **************
Response Time (ms) Location
Deferred srv*
Symbol search path is: srv*
Executable search path is:
Windows 10 Kernel Version 19041 MP (4 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS
Edition build lab: 19041.1.amd64fre.vb_release.191206-1406
Machine Name:
Kernel base = 0xfffff805`3f400000 PsLoadedModuleList = 0xfffff805`4002a3b0
Debug session time: Sat Nov 21 01:30:29.353 2020 (UTC + 3:00)
System Uptime: 0 days 1:07:07.031
Loading Kernel Symbols
...............................................................
................................................................
................................................................
...........
Loading User Symbols
Loading unloaded module list
...............
For analysis of this file, run !analyze -v
nt!KeBugCheckEx:
fffff805`3f7f5210 48894c2408 mov qword ptr [rsp+8],rcx ss:0018:ffffe481`6bfef1d0=0000000000000050
1: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
PAGE_FAULT_IN_NONPAGED_AREA (50)
Invalid system memory was referenced. This cannot be protected by try-except.
Typically the address is just plain bad or it is pointing at freed memory.
Arguments:
Arg1: ffffe280006f56d8, memory referenced.
Arg2: 0000000000000000, value 0 = read operation, 1 = write operation.
Arg3: 0000000000000000, If non-zero, the instruction address which referenced the bad memory
address.
Arg4: 0000000000000006, (reserved)
Debugging Details:
------------------
*** WARNING: Unable to verify timestamp for bcmwl63a.sys
Could not read faulting driver name
*** WARNING: Unable to verify checksum for win32k.sys
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 11952
Key : Analysis.DebugAnalysisProvider.CPP
Value: Create: 8007007e on DESKTOP-70T822T
Key : Analysis.DebugData
Value: CreateObject
Key : Analysis.DebugModel
Value: CreateObject
Key : Analysis.Elapsed.mSec
Value: 75425
Key : Analysis.Memory.CommitPeak.Mb
Value: 89
Key : Analysis.System
Value: CreateObject
Key : WER.OS.Branch
Value: vb_release
Key : WER.OS.Timestamp
Value: 2019-12-06T14:06:00Z
Key : WER.OS.Version
Value: 10.0.19041.1
ADDITIONAL_XML: 1
OS_BUILD_LAYERS: 1
BUGCHECK_CODE: 50
BUGCHECK_P1: ffffe280006f56d8
BUGCHECK_P2: 0
BUGCHECK_P3: 0
BUGCHECK_P4: 6
READ_ADDRESS: fffff805400fb390: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
fffff8054000f340: Unable to get Flags value from nt!KdVersionBlock
fffff8054000f340: Unable to get Flags value from nt!KdVersionBlock
unable to get nt!MmSpecialPagesInUse
ffffe280006f56d8
MM_INTERNAL_CODE: 6
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXPNP: 1 (!blackboxpnp)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: System
TRAP_FRAME: ffffe4816bfef550 -- (.trap 0xffffe4816bfef550)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=ffffe2f178bc5000 rbx=0000000000000000 rcx=ffffe280006f56d8
rdx=ffffe2f178bc5000 rsi=0000000000000000 rdi=0000000000000000
rip=fffff8053f741130 rsp=ffffe4816bfef6e8 rbp=ffffe2f178bc5000
r8=ffffe2f178a00018 r9=0000000000000002 r10=0000000000000002
r11=ffffe280006f56d8 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei pl zr na po nc
nt!MI_READ_PTE_LOCK_FREE:
fffff805`3f741130 488b01 mov rax,qword ptr [rcx] ds:ffffe280`006f56d8=????????????????
Resetting default scope
STACK_TEXT:
ffffe481`6bfef1c8 fffff805`3f82121f : 00000000`00000050 ffffe280`006f56d8 00000000`00000000 ffffe2f1`78a00018 : nt!KeBugCheckEx
ffffe481`6bfef1d0 fffff805`3f6ead67 : 00000000`00000000 00000000`00000000 ffffe481`6bfef550 00000000`00000000 : nt!MiInPagePageTable+0x1faa7f
ffffe481`6bfef320 fffff805`3f6ea20a : ffffd287`d8000000 00000000`00000000 ffffe481`6bfef5d0 00000000`00000000 : nt!MiUserFault+0x5e7
ffffe481`6bfef3b0 fffff805`3f80335e : ffffd287`d14021c0 00000000`0000007d ffffd287`d8000a00 fffff805`3f6247fb : nt!MmAccessFault+0x16a
ffffe481`6bfef550 fffff805`3f741130 : fffff805`3f649691 00000000`00000200 00000000`00000000 00000000`007c6e00 : nt!KiPageFault+0x35e
ffffe481`6bfef6e8 fffff805`3f649691 : 00000000`00000200 00000000`00000000 00000000`007c6e00 fffff805`3fdb1094 : nt!MI_READ_PTE_LOCK_FREE
ffffe481`6bfef6f0 fffff805`45a935bd : 00000000`00000000 ffffd287`00000001 00000000`00000000 ffffe280`00ebc4a8 : nt!MmBuildMdlForNonPagedPool+0x1f1
ffffe481`6bfef7b0 fffff805`53b4ea6f : 00000000`00000000 00000000`0000017a ffff9c81`2708b140 ffffd287`d33df080 : ndis!NdisAllocateMdl+0x3d
ffffe481`6bfef7f0 00000000`00000000 : 00000000`0000017a ffff9c81`2708b140 ffffd287`d33df080 00000000`00000062 : bcmwl63a+0x8ea6f
SYMBOL_NAME: bcmwl63a+8ea6f
MODULE_NAME: bcmwl63a
IMAGE_NAME: bcmwl63a.sys
STACK_COMMAND: .thread ; .cxr ; kb
BUCKET_ID_FUNC_OFFSET: 8ea6f
FAILURE_BUCKET_ID: AV_R_INVALID_bcmwl63a!unknown_function
OS_VERSION: 10.0.19041.1
BUILDLAB_STR: vb_release
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {d1296efd-0617-c4de-4b82-59e056c62646}
Followup: MachineOwner
---------