PAGE_FAULT_IN_NONPAGED_AREA (50)
Invalid system memory was referenced. This cannot be protected by try-except.
Typically the address is just plain bad or it is pointing at freed memory.
Arguments:
Arg1: ffff980ba74ae6b8, memory referenced.
Arg2: 0000000000000000, value 0 = read operation, 1 = write operation.
Arg3: fffff80427e4cd08, If non-zero, the instruction address which referenced the bad memory
address.
Arg4: 0000000000000002, (reserved)
Debugging Details:
------------------
Could not read faulting driver name
*** WARNING: Unable to verify checksum for win32k.sys
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 6187
Key : Analysis.DebugAnalysisProvider.CPP
Value: Create: 8007007e on DESKTOP-62N06FT
Key : Analysis.DebugData
Value: CreateObject
Key : Analysis.DebugModel
Value: CreateObject
Key : Analysis.Elapsed.mSec
Value: 10658
Key : Analysis.Memory.CommitPeak.Mb
Value: 85
Key : Analysis.System
Value: CreateObject
Key : WER.OS.Branch
Value: vb_release
Key : WER.OS.Timestamp
Value: 2019-12-06T14:06:00Z
Key : WER.OS.Version
Value: 10.0.19041.1
ADDITIONAL_XML: 1
OS_BUILD_LAYERS: 1
BUGCHECK_CODE: 50
BUGCHECK_P1: ffff980ba74ae6b8
BUGCHECK_P2: 0
BUGCHECK_P3: fffff80427e4cd08
BUGCHECK_P4: 2
READ_ADDRESS: fffff804288fb390: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
fffff8042880f340: Unable to get Flags value from nt!KdVersionBlock
fffff8042880f340: Unable to get Flags value from nt!KdVersionBlock
unable to get nt!MmSpecialPagesInUse
ffff980ba74ae6b8
MM_INTERNAL_CODE: 2
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: MemCompression
TRAP_FRAME: ffffd585be07d710 -- (.trap 0xffffd585be07d710)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=00000000000031ab rbx=0000000000000000 rcx=00000000000018d5
rdx=00000000000018d5 rsi=0000000000000000 rdi=0000000000000000
rip=fffff80427e4cd08 rsp=ffffd585be07d8a8 rbp=0000000000000001
r8=00000000200332cf r9=00000000ffffffff r10=0000000000000001
r11=ffff980ba74a2010 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei pl nz ac pe nc
nt!B_TREE<_SM_PAGE_KEY,SMKM_STORE_MGR<SM_TRAITS>::SMKM_FRONTEND_ENTRY,4096,B_TREE_DUMMY_NODE_POOL,B_TREE_KEY_COMPARATOR<_SM_PAGE_KEY> >::BTreeNodeFindKey+0x28:
fffff804`27e4cd08 418b0ccb mov ecx,dword ptr [r11+rcx*8] ds:ffff980b`a74ae6b8=????????
Resetting default scope
STACK_TEXT:
ffffd585`be07d468 fffff804`28079b57 : 00000000`00000050 ffff980b`a74ae6b8 00000000`00000000 ffffd585`be07d710 : nt!KeBugCheckEx
ffffd585`be07d470 fffff804`27eea5e0 : ffffd585`be07d5d0 00000000`00000000 ffffd585`be07d790 00000000`00000000 : nt!MiSystemFault+0x1716c7
ffffd585`be07d570 fffff804`2800275e : ffffd585`be07d730 ffffd585`be07d728 00000000`0000ffff 00000000`0000ffff : nt!MmAccessFault+0x400
ffffd585`be07d710 fffff804`27e4cd08 : fffff804`27e4cc28 ffff980b`9d1a16d0 fffff804`27edb31e ffff980b`9d1a1080 : nt!KiPageFault+0x35e
ffffd585`be07d8a8 fffff804`27e4cc28 : ffff980b`9d1a16d0 fffff804`27edb31e ffff980b`9d1a1080 fffff804`28923b78 : nt!B_TREE<_SM_PAGE_KEY,SMKM_STORE_MGR<SM_TRAITS>::SMKM_FRONTEND_ENTRY,4096,B_TREE_DUMMY_NODE_POOL,B_TREE_KEY_COMPARATOR<_SM_PAGE_KEY> >::BTreeNodeFindKey+0x28
ffffd585`be07d8b0 fffff804`27e99351 : 00000000`200332cf ffffd585`be07da00 fffff804`28923b78 fffff804`28923b78 : nt!B_TREE<_SM_PAGE_KEY,SMKM_STORE_MGR<SM_TRAITS>::SMKM_FRONTEND_ENTRY,4096,B_TREE_DUMMY_NODE_POOL,B_TREE_KEY_COMPARATOR<_SM_PAGE_KEY> >::BTreeSearchKey+0x78
ffffd585`be07d900 fffff804`27e4d4ac : ffff980b`9d1a1080 00000000`00000001 ffff980b`a39f6c50 fffff804`27ea7347 : nt!SMKM_STORE_MGR<SM_TRAITS>::SmFeEvictComplete+0xb5
ffffd585`be07da50 fffff804`27e4d273 : 00000000`00000001 00000000`00000001 00000000`00000001 00000000`00000000 : nt!SMKM_STORE_MGR<SM_TRAITS>::SmIoCtxWorkItemComplete+0x164
ffffd585`be07daa0 fffff804`27e4df5b : ffff980b`9d28a000 ffffd585`be07db98 00000000`00000001 ffff980b`9d1a1080 : nt!SMKM_STORE_MGR<SM_TRAITS>::SmWorkItemFree+0xcb
ffffd585`be07db20 fffff804`27ead131 : ffffc201`00000000 ffff980b`00000000 00000000`00001000 00000000`00000000 : nt!SMKM_STORE<SM_TRAITS>::SmStWorker+0x2f7
ffffd585`be07dbe0 fffff804`27ea2ae5 : ffff980b`9d28a000 fffff804`27ead120 ffffd585`bdff03a8 00000000`00000001 : nt!SMKM_STORE<SM_TRAITS>::SmStWorkerThread+0x11
ffffd585`be07dc10 fffff804`27ffbbf8 : ffffc201`3fe80180 ffff980b`9d1a1080 fffff804`27ea2a90 00000000`00000000 : nt!PspSystemThreadStartup+0x55
ffffd585`be07dc60 00000000`00000000 : ffffd585`be07e000 ffffd585`be078000 00000000`00000000 00000000`00000000 : nt!KiStartSystemThread+0x28
SYMBOL_NAME: nt!B_TREE<_SM_PAGE_KEY,SMKM_STORE_MGR<SM_TRAITS>::SMKM_FRONTEND_ENTRY,4096,B_TREE_DUMMY_NODE_POOL,B_TREE_KEY_COMPARATOR<_SM_PAGE_KEY> >::BTreeNodeFindKey+28
MODULE_NAME: nt
IMAGE_NAME: ntkrnlmp.exe
IMAGE_VERSION: 10.0.19041.572
STACK_COMMAND: .thread ; .cxr ; kb
BUCKET_ID_FUNC_OFFSET: 28
FAILURE_BUCKET_ID: AV_R_INVALID_nt!B_TREE__SM_PAGE_KEY,SMKM_STORE_MGR_SM_TRAITS_::SMKM_FRONTEND_ENTRY,4096,B_TREE_DUMMY_NODE_POOL,B_TREE_KEY_COMPARATOR__SM_PAGE_KEY___::BTreeNodeFindKey
OS_VERSION: 10.0.19041.1
BUILDLAB_STR: vb_release
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {2d8744cc-bf27-e959-3f06-7274800b277e}
Followup: MachineOwner
---------
DPC_WATCHDOG_VIOLATION (133)
The DPC watchdog detected a prolonged run time at an IRQL of DISPATCH_LEVEL
or above.
Arguments:
Arg1: 0000000000000001, The system cumulatively spent an extended period of time at
DISPATCH_LEVEL or above. The offending component can usually be
identified with a stack trace.
Arg2: 0000000000001e00, The watchdog period.
Arg3: fffff80411cfb320, cast to nt!DPC_WATCHDOG_GLOBAL_TRIAGE_BLOCK, which contains
additional information regarding the cumulative timeout
Arg4: 0000000000000000
Debugging Details:
------------------
*************************************************************************
*** ***
*** ***
*** Either you specified an unqualified symbol, or your debugger ***
*** doesn't have full symbol information. Unqualified symbol ***
*** resolution is turned off by default. Please either specify a ***
*** fully qualified symbol module!symbolname, or enable resolution ***
*** of unqualified symbols by typing ".symopt- 100". Note that ***
*** enabling unqualified symbol resolution with network symbol ***
*** server shares in the symbol path may cause the debugger to ***
*** appear to hang for long periods of time when an incorrect ***
*** symbol name is typed or the network symbol server is down. ***
*** ***
*** For some commands to work properly, your symbol path ***
*** must point to .pdb files that have full type information. ***
*** ***
*** Certain .pdb files (such as the public OS symbols) do not ***
*** contain the required information. Contact the group that ***
*** provided you with these symbols if you need this command to ***
*** work. ***
*** ***
*** Type referenced: TickPeriods ***
*** ***
*************************************************************************
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 7343
Key : Analysis.DebugAnalysisProvider.CPP
Value: Create: 8007007e on DESKTOP-62N06FT
Key : Analysis.DebugData
Value: CreateObject
Key : Analysis.DebugModel
Value: CreateObject
Key : Analysis.Elapsed.mSec
Value: 11312
Key : Analysis.Memory.CommitPeak.Mb
Value: 86
Key : Analysis.System
Value: CreateObject
Key : WER.OS.Branch
Value: vb_release
Key : WER.OS.Timestamp
Value: 2019-12-06T14:06:00Z
Key : WER.OS.Version
Value: 10.0.19041.1
ADDITIONAL_XML: 1
OS_BUILD_LAYERS: 1
BUGCHECK_CODE: 133
BUGCHECK_P1: 1
BUGCHECK_P2: 1e00
BUGCHECK_P3: fffff80411cfb320
BUGCHECK_P4: 0
DPC_TIMEOUT_TYPE: DPC_QUEUE_EXECUTION_TIMEOUT_EXCEEDED
TRAP_FRAME: ffff8604e3804ea0 -- (.trap 0xffff8604e3804ea0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000002 rbx=0000000000000000 rcx=ffffd303eac09e98
rdx=0000000000000002 rsi=0000000000000000 rdi=0000000000000000
rip=fffff80411229dd0 rsp=ffff8604e3805030 rbp=ffffac0ad4609da0
r8=0000000000000000 r9=0000000000000000 r10=fffffbfdfeff77f8
r11=fffffbfdfeff7000 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei pl zr na po nc
nt!ExpWaitForSpinLockExclusiveAndAcquire+0xb0:
fffff804`11229dd0 eb8e jmp nt!ExpWaitForSpinLockExclusiveAndAcquire+0x40 (fffff804`11229d60)
Resetting default scope
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: svchost.exe
STACK_TEXT:
ffffbd01`71399e18 fffff804`11487a98 : 00000000`00000133 00000000`00000001 00000000`00001e00 fffff804`11cfb320 : nt!KeBugCheckEx
ffffbd01`71399e20 fffff804`11326993 : 00005f8b`ce13446b ffffbd01`71380180 00000000`00000000 ffffbd01`71380180 : nt!KeAccumulateTicks+0x15dda8
ffffbd01`71399e80 fffff804`1132647a : ffffac0a`d16cd260 ffff8604`e3804f20 ffff8700`00e4c600 00000000`00000001 : nt!KeClockInterruptNotify+0x453
ffffbd01`71399f30 fffff804`1122ecd5 : ffffac0a`d16cd260 00000000`00000000 00000000`00000000 ffff813e`4026e6ab : nt!HalpTimerClockIpiRoutine+0x1a
ffffbd01`71399f60 fffff804`113f604a : ffff8604`e3804f20 ffffac0a`d16cd260 ffffffff`ffffffff db1dd59c`d75dd598 : nt!KiCallInterruptServiceRoutine+0xa5
ffffbd01`71399fb0 fffff804`113f65b7 : 00000000`89d005f2 ffff8a00`000160e8 00000000`00001000 00000000`00000004 : nt!KiInterruptSubDispatchNoLockNoEtw+0xfa
ffff8604`e3804ea0 fffff804`11229dd0 : ffff8700`00000028 ffff8700`00e4c600 00000000`00000006 ffffac0a`d4609da0 : nt!KiInterruptDispatchNoLockNoEtw+0x37
ffff8604`e3805030 fffff804`1133b6a2 : ffffd303`eac09e98 ffffac0a`d4609da0 ffffbd01`71380180 ffff8700`03480420 : nt!ExpWaitForSpinLockExclusiveAndAcquire+0xb0
ffff8604`e3805060 fffff804`1132045f : ffffac0a`d16a3b40 00000000`0001b2c0 ffffac0a`e3be2280 00000000`00000001 : nt!MiMakePageAvoidRead+0x1202
ffff8604`e38051e0 fffff804`1131f60c : ffff8c84`abb9c000 0000019a`010ce1e8 ffff8604`00000000 00000000`000002c0 : nt!MmCopyToCachedPage+0x28f
ffff8604`e38052b0 fffff804`1131e77a : ffffac0a`e3be2280 0000019a`010ce1e8 ffff8604`e38054a8 00000000`00000000 : nt!CcMapAndCopyInToCache+0x41c
ffff8604`e3805450 fffff804`0c5a995b : ffff8604`e38055c0 00000000`00001000 00000000`0001c2c0 00000000`00001000 : nt!CcCopyWriteEx+0xea
ffff8604`e38054d0 fffff804`0b8a73fb : 00000000`00000000 ffff8604`e38058e8 ffff8604`e38058a8 0000019a`010cd4a8 : Ntfs!NtfsCopyWriteA+0x44b
ffff8604`e3805800 fffff804`0b8a44d7 : ffff8604`e3805910 ffff8604`e38058a8 ffffac0a`eaceaba0 ffffac0a`eaceaaa0 : FLTMGR!FltpPerformFastIoCall+0x16b
ffff8604`e3805860 fffff804`0b8db215 : ffff8604`e3806000 ffff8604`e3800000 ffffac0a`dd03d0d8 ffffac0a`e4c06480 : FLTMGR!FltpPassThroughFastIo+0x107
ffff8604`e38058e0 fffff804`116b8c4d : ffffac0a`e4c06480 0000005f`120fd360 0000005f`120fd360 00000000`00000000 : FLTMGR!FltpFastIoWrite+0x165
ffff8604`e3805990 fffff804`11405fb8 : 00000000`00000000 00000000`00000000 00000000`00000000 0000005f`120fd390 : nt!NtWriteFile+0x43d
ffff8604`e3805a90 00007ff8`c468be94 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x28
0000005f`120fd2e8 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ff8`c468be94
SYMBOL_NAME: nt!KeAccumulateTicks+15dda8
MODULE_NAME: nt
IMAGE_NAME: ntkrnlmp.exe
IMAGE_VERSION: 10.0.19041.572
STACK_COMMAND: .thread ; .cxr ; kb
BUCKET_ID_FUNC_OFFSET: 15dda8
FAILURE_BUCKET_ID: 0x133_ISR_nt!KeAccumulateTicks
OS_VERSION: 10.0.19041.1
BUILDLAB_STR: vb_release
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {65350307-c3b9-f4b5-8829-4d27e9ff9b06}
Followup: MachineOwner
---------