1: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
PAGE_FAULT_IN_NONPAGED_AREA (50)
Invalid system memory was referenced. This cannot be protected by try-except.
Typically the address is just plain bad or it is pointing at freed memory.
Arguments:
Arg1: ffffbd894cf7e800, memory referenced.
Arg2: 0000000000000002, X64: bit 0 set if the fault was due to a not-present PTE.
bit 1 is set if the fault was due to a write, clear if a read.
bit 3 is set if the processor decided the fault was due to a corrupted PTE.
bit 4 is set if the fault was due to attempted execute of a no-execute PTE.
- ARM64: bit 1 is set if the fault was due to a write, clear if a read.
bit 3 is set if the fault was due to attempted execute of a no-execute PTE.
Arg3: fffff8065a408a04, If non-zero, the instruction address which referenced the bad memory
address.
Arg4: 0000000000000002, (reserved)
Debugging Details:
------------------
*** WARNING: Unable to verify timestamp for win32k.sys
KEY_VALUES_STRING: 1
Key : AV.Type
Value: Write
Key : Analysis.CPU.mSec
Value: 3952
Key : Analysis.DebugAnalysisManager
Value: Create
Key : Analysis.Elapsed.mSec
Value: 22883
Key : Analysis.IO.Other.Mb
Value: 0
Key : Analysis.IO.Read.Mb
Value: 0
Key : Analysis.IO.Write.Mb
Value: 0
Key : Analysis.Init.CPU.mSec
Value: 405
Key : Analysis.Init.Elapsed.mSec
Value: 8115
Key : Analysis.Memory.CommitPeak.Mb
Value: 86
Key : Bugcheck.Code.DumpHeader
Value: 0x50
Key : Bugcheck.Code.Register
Value: 0x50
Key : WER.OS.Branch
Value: vb_release
Key : WER.OS.Timestamp
Value: 2019-12-06T14:06:00Z
Key : WER.OS.Version
Value: 10.0.19041.1
FILE_IN_CAB: 061123-18625-01.dmp
BUGCHECK_CODE: 50
BUGCHECK_P1: ffffbd894cf7e800
BUGCHECK_P2: 2
BUGCHECK_P3: fffff8065a408a04
BUGCHECK_P4: 2
READ_ADDRESS: fffff8065aefb390: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
unable to get nt!MmSpecialPagesInUse
ffffbd894cf7e800
MM_INTERNAL_CODE: 2
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXPNP: 1 (!blackboxpnp)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: System
TRAP_FRAME: ffff9309171ccf80 -- (.trap 0xffff9309171ccf80)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000000 rbx=0000000000000000 rcx=ffffbd894cf7e830
rdx=00000000746c6644 rsi=0000000000000000 rdi=0000000000000000
rip=fffff8065a408a04 rsp=ffff9309171cd110 rbp=ffffbf8948a965e0
r8=ffff9309171cd190 r9=7fffbf895176d5c8 r10=0000000000000000
r11=0000000000000001 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei pl zr na po nc
nt!ObfReferenceObjectWithTag+0x24:
fffff806`5a408a04 f0480fc15ed0 lock xadd qword ptr [rsi-30h],rbx ds:ffffffff`ffffffd0=????????????????
Resetting default scope
STACK_TEXT:
ffff9309`171cccd8 fffff806`5a64ac53 : 00000000`00000050 ffffbd89`4cf7e800 00000000`00000002 ffff9309`171ccf80 : nt!KeBugCheckEx
ffff9309`171ccce0 fffff806`5a46e7b0 : ffffbf89`51000000 00000000`00000002 ffff9309`171cd000 00000000`00000000 : nt!MiSystemFault+0x1b2273
ffff9309`171ccde0 fffff806`5a60b7d8 : 00000000`000004b8 ffff9309`171cd018 ffffbf89`51b03000 00000000`00001001 : nt!MmAccessFault+0x400
ffff9309`171ccf80 fffff806`5a408a04 : 00000000`00001000 ffffbf89`48b57b30 ffffbf89`4a453690 fffff806`5a420ceb : nt!KiPageFault+0x358
ffff9309`171cd110 fffff806`5a409844 : ffffbd89`4cf7e830 ffffbf89`48b97260 ffffbf89`48b97260 ffffe180`d3541d00 : nt!ObfReferenceObjectWithTag+0x24
ffff9309`171cd150 fffff806`5a448044 : ffffbf89`5176d4c0 00000000`00000000 00000000`00000000 00000000`00000000 : nt!ObFastReferenceObjectLocked+0x1c
ffff9309`171cd180 fffff806`5a44801a : ffffbf89`48b97260 ffffbf89`5176d4b0 ffffbf89`5176d4b0 ffffbf89`5176d4c0 : nt!CcSlowReferenceSharedCacheMapFileObject+0x20
ffff9309`171cd1b0 fffff806`5a49cd4d : ffffbf89`48b57b30 ffffbf89`51d367b0 ffffbf89`00000000 ffffbf89`00000000 : nt!CcReferenceSharedCacheMapFileObject+0x26
ffff9309`171cd1e0 fffff806`5a53b955 : ffffbf89`48b57b30 ffff9309`171cd330 ffff9309`00001000 00000001`0a49cc32 : nt!CcGetDirtyPagesHelper+0x11d
ffff9309`171cd2d0 fffff806`5a53b88f : ffffbf89`4a40c5a8 ffff9309`171cda80 ffff9309`171cda00 00000001`0a5deef6 : nt!CcForEachPartition+0xb5
ffff9309`171cd310 fffff806`5c5e7f22 : ffffbf89`4a40c5a8 ffff9309`171cda00 00000001`0a5deef6 ffffbf89`4a40c5a8 : nt!CcGetDirtyPages+0x2f
ffff9309`171cd370 fffff806`5c60c642 : 00000000`00000000 ffff9309`171ce000 01d99c5c`f6520f00 ffffbf89`4a40c100 : Ntfs!NtfsCheckpointVolume+0x5e2
ffff9309`171cd870 fffff806`5c60b14d : ffff9309`171cda10 ffffbf89`4a40c180 ffff9309`171cd9c0 01d99c5c`f6520f01 : Ntfs!NtfsCheckpointAllVolumesWorker+0xe2
ffff9309`171cd8d0 fffff806`5c60a6ae : ffff9309`171cda10 00000000`00000000 00000000`00000000 fffff806`5c60c560 : Ntfs!NtfsForEachVcb+0x201
ffff9309`171cd980 fffff806`5a48e5c5 : ffffbf89`4a453040 ffffbf89`4a453040 ffffbf89`48a806a0 fffff806`5c5952b0 : Ntfs!NtfsCheckpointAllVolumes+0x1ee
ffff9309`171cdcb0 fffff806`5a5265f5 : ffffbf89`4a453040 00000000`00000080 ffffbf89`48a7c080 00018000`a91b3ffe : nt!ExpWorkerThread+0x105
ffff9309`171cdd50 fffff806`5a6048d8 : ffff9b81`77580180 ffffbf89`4a453040 fffff806`5a5265a0 00000000`00000000 : nt!PspSystemThreadStartup+0x55
ffff9309`171cdda0 00000000`00000000 : ffff9309`171ce000 ffff9309`171c8000 00000000`00000000 00000000`00000000 : nt!KiStartSystemThread+0x28
SYMBOL_NAME: nt!ObfReferenceObjectWithTag+24
MODULE_NAME: nt
IMAGE_NAME: ntkrnlmp.exe
IMAGE_VERSION: 10.0.19041.2965
STACK_COMMAND: .cxr; .ecxr ; kb
BUCKET_ID_FUNC_OFFSET: 24
FAILURE_BUCKET_ID: AV_W_(null)_nt!ObfReferenceObjectWithTag
OS_VERSION: 10.0.19041.1
BUILDLAB_STR: vb_release
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {394d19ec-4517-867a-8907-1b617d1d34f0}
Followup: MachineOwner
---------