PAGE_FAULT_IN_NONPAGED_AREA (50)
Invalid system memory was referenced. This cannot be protected by try-except.
Typically the address is just plain bad or it is pointing at freed memory.
Arguments:
Arg1: ffff910bdeab3870, memory referenced.
Arg2: 0000000000000000, value 0 = read operation, 1 = write operation.
Arg3: fffff80048ec93fc, If non-zero, the instruction address which referenced the bad memory
address.
Arg4: 0000000000000002, (reserved)
Debugging Details:
------------------
Could not read faulting driver name
*** WARNING: Unable to verify timestamp for win32k.sys
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 5296
Key : Analysis.DebugAnalysisProvider.CPP
Value: Create: 8007007e on BORA
Key : Analysis.DebugData
Value: CreateObject
Key : Analysis.DebugModel
Value: CreateObject
Key : Analysis.Elapsed.mSec
Value: 12002
Key : Analysis.Memory.CommitPeak.Mb
Value: 81
Key : Analysis.System
Value: CreateObject
Key : WER.OS.Branch
Value: vb_release
Key : WER.OS.Timestamp
Value: 2019-12-06T14:06:00Z
Key : WER.OS.Version
Value: 10.0.19041.1
ADDITIONAL_XML: 1
OS_BUILD_LAYERS: 1
BUGCHECK_CODE: 50
BUGCHECK_P1: ffff910bdeab3870
BUGCHECK_P2: 0
BUGCHECK_P3: fffff80048ec93fc
BUGCHECK_P4: 2
READ_ADDRESS: fffff800498fb390: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
fffff8004980f340: Unable to get Flags value from nt!KdVersionBlock
fffff8004980f340: Unable to get Flags value from nt!KdVersionBlock
unable to get nt!MmSpecialPagesInUse
ffff910bdeab3870
MM_INTERNAL_CODE: 2
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: System
TRAP_FRAME: fffff3882f7d40d0 -- (.trap 0xfffff3882f7d40d0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000000 rbx=0000000000000000 rcx=0000000000000000
rdx=ffffb10bd8013b18 rsi=0000000000000000 rdi=0000000000000000
rip=fffff80048ec93fc rsp=fffff3882f7d4268 rbp=0000000000000023
r8=0000000000000000 r9=0000000000000000 r10=0000000000000000
r11=ffff910bdeab3868 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei ng nz na pe nc
nt!RtlRbRemoveNode+0x7c:
fffff800`48ec93fc 498b4308 mov rax,qword ptr [r11+8] ds:ffff910b`deab3870=????????????????
Resetting default scope
STACK_TEXT:
fffff388`2f7d3e28 fffff800`49079b57 : 00000000`00000050 ffff910b`deab3870 00000000`00000000 fffff388`2f7d40d0 : nt!KeBugCheckEx
fffff388`2f7d3e30 fffff800`48eea5e0 : 00000000`00000008 00000000`00000000 fffff388`2f7d4150 00000000`00000000 : nt!MiSystemFault+0x1716c7
fffff388`2f7d3f30 fffff800`4900275e : fffff388`2f7d4238 fffff388`2f7d4260 00000000`00000000 fffff800`48f18669 : nt!MmAccessFault+0x400
fffff388`2f7d40d0 fffff800`48ec93fc : 00000059`00220000 00010022`00230000 fffff800`48ec9140 00000000`00000023 : nt!KiPageFault+0x35e
fffff388`2f7d4268 fffff800`48ec9140 : 00000000`00000023 ffffb10b`d8013d30 00000000`00000000 ffffb10b`d8013b10 : nt!RtlRbRemoveNode+0x7c
fffff388`2f7d4280 fffff800`48ec8b88 : ffffb10b`d0200280 ffffb10b`d8005000 ffffb10b`d0200280 fffff388`2f7d4388 : nt!RtlpHpVsChunkCoalesce+0xb0
fffff388`2f7d42e0 fffff800`48ec7514 : 00000000`00000000 fffff800`00000000 00000000`00000000 00000000`00000000 : nt!RtlpHpVsContextFree+0x188
fffff388`2f7d4380 fffff800`495b1019 : 00000000`00000580 00000000`00000000 00000000`00000000 01000000`00100000 : nt!ExFreeHeapPool+0x4d4
fffff388`2f7d4460 fffff800`4ca8b91a : fffff388`2f7d4538 00000000`00000000 00000000`000012e9 ffffa102`f251e180 : nt!ExFreePool+0x9
fffff388`2f7d4490 fffff800`4c997812 : fffff388`00000000 ffffb10b`d5439800 ffffb10b`0000044e 00000000`00000000 : Ntfs!NtfsDeleteFcb+0x47a
fffff388`2f7d4510 fffff800`4ca8bcea : fffff388`2f7d48f0 ffffa102`f251e180 ffffb10b`de52c9f0 ffffb10b`de52ce48 : Ntfs!NtfsTeardownFromLcb+0x272
fffff388`2f7d45b0 fffff800`4c99bd40 : fffff388`2f7d48f0 fffff388`2f7d46b2 ffffb10b`de52ce48 ffffb10b`de52c9f0 : Ntfs!NtfsTeardownStructures+0xea
fffff388`2f7d4630 fffff800`4cabb547 : fffff388`2f7d4700 ffffb10b`00000000 00000000`00000000 ffffb10b`de52c900 : Ntfs!NtfsDecrementCloseCounts+0xb0
fffff388`2f7d4670 fffff800`4cab8061 : fffff388`2f7d48f0 ffffb10b`de52cb50 ffffb10b`de52c9f0 ffffa102`f251e180 : Ntfs!NtfsCommonClose+0x467
fffff388`2f7d4750 fffff800`4cad7a28 : 00000000`0000001c fffff800`49925440 00000000`00000000 00000000`00000000 : Ntfs!NtfsFspCloseInternal+0x241
fffff388`2f7d48b0 fffff800`48f035f5 : ffffa102`fbfe8040 fffff800`4cad79a0 ffffa102`f00a3a20 00000000`00000000 : Ntfs!NtfsFspClose+0x88
fffff388`2f7d4b70 fffff800`48ea2ae5 : ffffa102`fbfe8040 00000000`00000080 ffffa102`f00a2040 fffff800`00000001 : nt!ExpWorkerThread+0x105
fffff388`2f7d4c10 fffff800`48ffbbf8 : ffffc481`d3c43180 ffffa102`fbfe8040 fffff800`48ea2a90 fffff388`2f7d4c80 : nt!PspSystemThreadStartup+0x55
fffff388`2f7d4c60 00000000`00000000 : fffff388`2f7d5000 fffff388`2f7cf000 00000000`00000000 00000000`00000000 : nt!KiStartSystemThread+0x28
SYMBOL_NAME: nt!ExFreePool+9
IMAGE_NAME: Pool_Corruption
IMAGE_VERSION: 10.0.19041.572
MODULE_NAME: Pool_Corruption
STACK_COMMAND: .thread ; .cxr ; kb
BUCKET_ID_FUNC_OFFSET: 9
FAILURE_BUCKET_ID: AV_R_INVALID_nt!ExFreePool
OS_VERSION: 10.0.19041.1
BUILDLAB_STR: vb_release
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {abe5a486-9a07-9785-197c-226bb9273d2c}
Followup: Pool_corruption
---------
MEMORY_MANAGEMENT (1a)
# Any other values for parameter 1 must be individually examined.
Arguments:
Arg1: 0000000000061941, The subtype of the bugcheck.
Arg2: 000001e735fe1000
Arg3: 000000000000000d
Arg4: ffffac861bf95b00
Debugging Details:
------------------
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 4280
Key : Analysis.DebugAnalysisProvider.CPP
Value: Create: 8007007e on BORA
Key : Analysis.DebugData
Value: CreateObject
Key : Analysis.DebugModel
Value: CreateObject
Key : Analysis.Elapsed.mSec
Value: 7678
Key : Analysis.Memory.CommitPeak.Mb
Value: 76
Key : Analysis.System
Value: CreateObject
Key : WER.OS.Branch
Value: vb_release
Key : WER.OS.Timestamp
Value: 2019-12-06T14:06:00Z
Key : WER.OS.Version
Value: 10.0.19041.1
ADDITIONAL_XML: 1
OS_BUILD_LAYERS: 1
BUGCHECK_CODE: 1a
BUGCHECK_P1: 61941
BUGCHECK_P2: 1e735fe1000
BUGCHECK_P3: d
BUGCHECK_P4: ffffac861bf95b00
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXPNP: 1 (!blackboxpnp)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: SearchIndexer.exe
STACK_TEXT:
ffffac86`1bf95958 fffff806`70e73a20 : 00000000`0000001a 00000000`00061941 000001e7`35fe1000 00000000`0000000d : nt!KeBugCheckEx
ffffac86`1bf95960 fffff806`70e0275e : ffffc58f`cdf32080 ffffac86`00000000 00000000`00000000 00000000`00000000 : nt!MmAccessFault+0x189840
ffffac86`1bf95b00 00007ffc`36f36575 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiPageFault+0x35e
000000d4`30c7bc50 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffc`36f36575
MODULE_NAME: hardware
IMAGE_NAME: hardware_ram
STACK_COMMAND: .thread ; .cxr ; kb
FAILURE_BUCKET_ID: 0x1a_61941_PAGE_TABLE_RESERVED_BITS_SET_IMAGE_hardware_ram
OS_VERSION: 10.0.19041.1
BUILDLAB_STR: vb_release
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {c6e5c6cf-692e-7852-5dc5-b74944540fc0}
Followup: MachineOwner
---------
MEMORY_MANAGEMENT (1a)
# Any other values for parameter 1 must be individually examined.
Arguments:
Arg1: 0000000000061941, The subtype of the bugcheck.
Arg2: ffffc10508c0005c
Arg3: 0000000000000009
Arg4: ffffd1079ed5cec0
Debugging Details:
------------------
*** WARNING: Unable to verify timestamp for win32k.sys
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 5109
Key : Analysis.DebugAnalysisProvider.CPP
Value: Create: 8007007e on BORA
Key : Analysis.DebugData
Value: CreateObject
Key : Analysis.DebugModel
Value: CreateObject
Key : Analysis.Elapsed.mSec
Value: 16235
Key : Analysis.Memory.CommitPeak.Mb
Value: 81
Key : Analysis.System
Value: CreateObject
Key : WER.OS.Branch
Value: vb_release
Key : WER.OS.Timestamp
Value: 2019-12-06T14:06:00Z
Key : WER.OS.Version
Value: 10.0.19041.1
ADDITIONAL_XML: 1
OS_BUILD_LAYERS: 1
BUGCHECK_CODE: 1a
BUGCHECK_P1: 61941
BUGCHECK_P2: ffffc10508c0005c
BUGCHECK_P3: 9
BUGCHECK_P4: ffffd1079ed5cec0
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: System
STACK_TEXT:
ffffd107`9ed5cd18 fffff802`72673a20 : 00000000`0000001a 00000000`00061941 ffffc105`08c0005c 00000000`00000009 : nt!KeBugCheckEx
ffffd107`9ed5cd20 fffff802`7260275e : ffffc105`0083c010 fffff802`724c3572 00000000`00000000 ffffd107`9ed5cf59 : nt!MmAccessFault+0x189840
ffffd107`9ed5cec0 fffff802`724272e0 : ffffc105`04b00260 00000000`00000011 ffffffff`ffffffff fffff802`72e50c00 : nt!KiPageFault+0x35e
ffffd107`9ed5d050 fffff802`72421348 : ffffc104`f7010280 ffffc104`f7010100 ffffc105`04b00000 fffff802`72487f67 : nt!RtlpHpSegPageRangeShrink+0x170
ffffd107`9ed5d0c0 fffff802`7241ff40 : ffffc105`04b13000 fffff802`724c9368 00000000`0000000f 000100c1`00000000 : nt!RtlpHpSegFree+0x9c
ffffd107`9ed5d100 fffff802`72471a9e : 00000000`00000000 ffffc105`04b13c40 ffffc105`0451fa10 00000000`00000ffd : nt!RtlpHpSegLfhVsFree+0x10
ffffd107`9ed5d130 fffff802`724c8f8c : ffffc104`f7010280 ffffc105`04b13000 00000000`0000003d ffffd107`9ed5d218 : nt!RtlpHpVsSubsegmentFree+0x3a
ffffd107`9ed5d170 fffff802`724c7514 : 00000000`00000000 ffffb10d`00000ffd 00000000`00000000 00000000`00000000 : nt!RtlpHpVsContextFree+0x58c
ffffd107`9ed5d210 fffff802`72bb1019 : 00000000`00000240 ffffd107`9ed5d3a0 00000000`00000000 01000000`00100000 : nt!ExFreeHeapPool+0x4d4
ffffd107`9ed5d2f0 fffff802`725115ce : 00000000`00000000 ffffd107`9ed5d3a0 ffffd107`9ed5d3a0 ffffc105`047214b0 : nt!ExFreePool+0x9
ffffd107`9ed5d320 fffff802`7250f2c3 : ffffc105`047214b0 ffffd107`9ed5d3f0 ffffc104`f6a10b00 00000000`00000000 : nt!CcDeleteSharedCacheMap+0x222
ffffd107`9ed5d370 fffff802`7589b2d0 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!CcUninitializeCacheMap+0x2f3
ffffd107`9ed5d430 fffff802`7588bfd0 : ffffb10d`2fa43000 ffffb10d`2fa43050 00000000`00000000 ffffb10d`2fa431b0 : Ntfs!NtfsDeleteInternalAttributeStream+0x10c
ffffd107`9ed5d470 fffff802`75797b95 : ffffb10d`2fa43050 ffffb10d`2fa431b0 00000000`00000000 ffffb10d`2fa431b0 : Ntfs!NtfsRemoveScb+0x130
ffffd107`9ed5d4d0 fffff802`75797869 : ffffb10d`2558a5e0 fffff802`758d79a0 ffffc104`f9d06180 ffffb10d`2fa43050 : Ntfs!NtfsPrepareFcbForRemoval+0x75
ffffd107`9ed5d510 fffff802`7588bcea : ffffd107`9ed5d8f0 ffffc104`f9d06180 ffffb10d`2558a5a0 ffffb10d`2558a9f8 : Ntfs!NtfsTeardownFromLcb+0x2c9
ffffd107`9ed5d5b0 fffff802`7579bd40 : ffffd107`9ed5d8f0 ffffd107`9ed5d6b2 ffffb10d`2558a9f8 ffffb10d`2558a5a0 : Ntfs!NtfsTeardownStructures+0xea
ffffd107`9ed5d630 fffff802`758bb547 : ffffd107`9ed5d700 ffffb10d`00000000 00000000`00000000 ffffb10d`2558a500 : Ntfs!NtfsDecrementCloseCounts+0xb0
ffffd107`9ed5d670 fffff802`758b8061 : ffffd107`9ed5d8f0 ffffb10d`2558a700 ffffb10d`2558a5a0 ffffc104`f9d06180 : Ntfs!NtfsCommonClose+0x467
ffffd107`9ed5d750 fffff802`758d7a28 : 00000000`0000001c fffff802`72f25440 00000000`00000000 00000000`00000000 : Ntfs!NtfsFspCloseInternal+0x241
ffffd107`9ed5d8b0 fffff802`725035f5 : ffffc105`004f5040 fffff802`758d79a0 ffffc104`f6868b40 00000000`00000000 : Ntfs!NtfsFspClose+0x88
ffffd107`9ed5db70 fffff802`724a2ae5 : ffffc105`004f5040 00000000`00000080 ffffc104`f68a1040 00000000`00000001 : nt!ExpWorkerThread+0x105
ffffd107`9ed5dc10 fffff802`725fbbf8 : ffff9b00`1075c180 ffffc105`004f5040 fffff802`724a2a90 00000000`00000000 : nt!PspSystemThreadStartup+0x55
ffffd107`9ed5dc60 00000000`00000000 : ffffd107`9ed5e000 ffffd107`9ed58000 00000000`00000000 00000000`00000000 : nt!KiStartSystemThread+0x28
MODULE_NAME: hardware
IMAGE_NAME: hardware_ram
STACK_COMMAND: .thread ; .cxr ; kb
FAILURE_BUCKET_ID: 0x1a_61941_PAGE_TABLE_RESERVED_BITS_SET_IMAGE_hardware_ram
OS_VERSION: 10.0.19041.1
BUILDLAB_STR: vb_release
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {c6e5c6cf-692e-7852-5dc5-b74944540fc0}
Followup: MachineOwner
---------