MEMORY_MANAGEMENT (1a)
# Any other values for parameter 1 must be individually examined.
Arguments:
Arg1: 0000000000041790, A page table page has been corrupted. On a 64 bit OS, parameter 2
contains the address of the PFN for the corrupted page table page.
On a 32 bit OS, parameter 2 contains a pointer to the number of used
PTEs, and parameter 3 contains the number of used PTEs.
Arg2: ffffe70002302dd0
Arg3: 0000000000000000
Arg4: 0000000000000001
Debugging Details:
------------------
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 6046
Key : Analysis.DebugAnalysisProvider.CPP
Value: Create: 8007007e on DESKTOP-62N06FT
Key : Analysis.DebugData
Value: CreateObject
Key : Analysis.DebugModel
Value: CreateObject
Key : Analysis.Elapsed.mSec
Value: 21298
Key : Analysis.Memory.CommitPeak.Mb
Value: 84
Key : Analysis.System
Value: CreateObject
Key : WER.OS.Branch
Value: vb_release
Key : WER.OS.Timestamp
Value: 2019-12-06T14:06:00Z
Key : WER.OS.Version
Value: 10.0.19041.1
ADDITIONAL_XML: 1
OS_BUILD_LAYERS: 1
BUGCHECK_CODE: 1a
BUGCHECK_P1: 41790
BUGCHECK_P2: ffffe70002302dd0
BUGCHECK_P3: 0
BUGCHECK_P4: 1
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXPNP: 1 (!blackboxpnp)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: DyingLightGame.exe
STACK_TEXT:
ffffd30d`d6d8caf8 fffff803`3ea381dd : 00000000`0000001a 00000000`00041790 ffffe700`02302dd0 00000000`00000000 : nt!KeBugCheckEx
ffffd30d`d6d8cb00 fffff803`3e9ebdf8 : 00000000`00000001 ffffe680`00000000 00000000`00000000 ffffd30d`d6d8cc70 : nt!MiDecreaseUsedPtesCount+0x1d6ed9
ffffd30d`d6d8cb40 fffff803`3e930e03 : 00000000`00000000 00000000`00000000 ffffd30d`d6d8d780 ffffd30d`d6d8d700 : nt!MiReducePteUseCount+0x30
ffffd30d`d6d8cb70 fffff803`3ece17fd : ffffd601`54c31080 ffffd601`546c18c8 ffffd601`00000000 00000000`00000000 : nt!MiDecommitPages+0xf93
ffffd30d`d6d8d740 fffff803`3ece20c3 : ffffd30d`d6d8d8c0 00000000`00000000 ffffd30d`d6d8d8c0 ffffd601`546c18a0 : nt!MiDecommitRegion+0x7d
ffffd30d`d6d8d7c0 fffff803`3ece19b5 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!MmFreeVirtualMemory+0x6d3
ffffd30d`d6d8d910 fffff803`3ea058b8 : ffffd601`54c31080 00000000`00000000 ffff1f00`6761a60a ffffd601`5c207b90 : nt!NtFreeVirtualMemory+0x95
ffffd30d`d6d8d970 fffff803`3e9f7d00 : fffff803`4a1a5e58 ffffd601`54c31080 ffffd601`5c1bc540 ffffd601`54c318b0 : nt!KiSystemServiceCopyEnd+0x28
ffffd30d`d6d8db08 fffff803`4a1a5e58 : ffffd601`54c31080 ffffd601`5c1bc540 ffffd601`54c318b0 fffff803`4a1a86a7 : nt!KiServiceLinkage
ffffd30d`d6d8db10 fffff803`4a1a937a : 00000000`01000000 ffff9a09`9e5da848 ffff9a09`a5c25aa0 ffffd601`4f9a3320 : dxgmms2!VIDMM_RECYCLE_RANGE::DebouncedDecommit+0x160
ffffd30d`d6d8db60 fffff803`4a1f2868 : ffffd30d`00000000 ffffd601`4f9a3958 ffff9a09`a73a8101 ffff9a09`a73af7d8 : dxgmms2!VIDMM_RECYCLE_HEAP_MGR::ProcessDebounceList+0x12a
ffffd30d`d6d8dbd0 fffff803`4a1aab41 : ffffd601`4f9a3850 ffff9a09`a73a6f10 ffffd601`5bfe7240 ffff9a09`9ff68c01 : dxgmms2!VIDMM_RECYCLE_HEAP_MGR::ProcessDebounceListsGlobally+0xd0
ffffd30d`d6d8dc60 fffff803`4a1b5fed : ffffd601`5ec22c10 ffff9a09`a14762b0 ffff9a09`9ff68cb0 00000000`00000000 : dxgmms2!VIDMM_RECYCLE_HEAP_MGR::Free+0x211
ffffd30d`d6d8dca0 fffff803`4a197aea : ffffd601`5ec22c10 00000000`00000003 ffffd601`5ec22c10 ffff9a09`9ff68cb0 : dxgmms2!VIDMM_GLOBAL::UncommitLocalBackingStore+0x171
ffffd30d`d6d8dd30 fffff803`4a1977d5 : 00000000`00000000 ffff9a09`00000000 ffffd30d`c001cd40 ffffd601`5ec22c10 : dxgmms2!VIDMM_GLOBAL::CloseOneAllocation+0x27a
ffffd30d`d6d8de70 fffff803`4a1328ba : 00000000`00000003 ffff9a09`a0d03b30 ffffd30d`d6d8e000 00000000`00000001 : dxgmms2!VIDMM_GLOBAL::CloseAllocation+0xc5
ffffd30d`d6d8dec0 fffff803`4851a89d : ffffd601`5ec22c58 ffffd30d`00000000 00000000`00000000 00000000`00000001 : dxgmms2!VidMmCloseAllocation+0x1a
ffffd30d`d6d8df00 fffff803`484fed5d : ffffd30d`d6d8e110 fffff803`48402e7d 00000000`00000003 ffff9a09`a0d03b30 : dxgkrnl!DXGDEVICE::DestroyAllocations+0x4c5
ffffd30d`d6d8e0a0 fffff803`484fe20b : 00000000`00870000 00000000`00000000 ffff9a09`00000000 ffff9a09`a5cc1730 : dxgkrnl!DXGDEVICE::TerminateAllocations+0x92d
ffffd30d`d6d8e140 fffff803`484ff468 : ffffd601`54f73528 ffffd30d`d6d8e650 ffffffff`ffffffff ffff9a09`9c08a010 : dxgkrnl!DxgkDestroyAllocationInternal+0xefb
ffffd30d`d6d8e550 fffff803`484ffa8b : 00000000`13b8fcc0 00000000`00000001 ffffd601`54c31080 fffff803`3ecd48fe : dxgkrnl!DxgkDestroyAllocationHelper+0x568
ffffd30d`d6d8ea20 fffff803`3ea058b8 : ffffd601`54c31080 ffffd601`54c31080 00000000`00000001 ffffd601`00000000 : dxgkrnl!DxgkDestroyAllocation2+0x21b
ffffd30d`d6d8eb00 00007ff8`34a649c4 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x28
00000000`13b8fc28 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ff8`34a649c4
SYMBOL_NAME: dxgmms2!VIDMM_RECYCLE_RANGE::DebouncedDecommit+160
MODULE_NAME: dxgmms2
IMAGE_NAME: dxgmms2.sys
IMAGE_VERSION: 10.0.19041.508
STACK_COMMAND: .thread ; .cxr ; kb
BUCKET_ID_FUNC_OFFSET: 160
FAILURE_BUCKET_ID: 0x1a_41790_dxgmms2!VIDMM_RECYCLE_RANGE::DebouncedDecommit
OS_VERSION: 10.0.19041.1
BUILDLAB_STR: vb_release
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {b4dd6f57-8ae8-5c62-c567-a68fe02d924e}
Followup: MachineOwner
---------
PFN_LIST_CORRUPT (4e)
Typically caused by drivers passing bad memory descriptor lists (ie: calling
MmUnlockPages twice with the same list, etc). If a kernel debugger is
available get the stack trace.
Arguments:
Arg1: 0000000000000002, A list entry was corrupt
Arg2: 0000000000004a90, entry in list being removed
Arg3: 000000000041f37f, highest physical page number
Arg4: 0000000000000001, reference count of entry being removed
Debugging Details:
------------------
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 4968
Key : Analysis.DebugAnalysisProvider.CPP
Value: Create: 8007007e on DESKTOP-62N06FT
Key : Analysis.DebugData
Value: CreateObject
Key : Analysis.DebugModel
Value: CreateObject
Key : Analysis.Elapsed.mSec
Value: 8575
Key : Analysis.Memory.CommitPeak.Mb
Value: 86
Key : Analysis.System
Value: CreateObject
Key : WER.OS.Branch
Value: vb_release
Key : WER.OS.Timestamp
Value: 2019-12-06T14:06:00Z
Key : WER.OS.Version
Value: 10.0.19041.1
ADDITIONAL_XML: 1
OS_BUILD_LAYERS: 1
BUGCHECK_CODE: 4e
BUGCHECK_P1: 2
BUGCHECK_P2: 4a90
BUGCHECK_P3: 41f37f
BUGCHECK_P4: 1
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXPNP: 1 (!blackboxpnp)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: VSSVC.exe
STACK_TEXT:
ffff808d`63291c88 fffff806`660fa0e9 : 00000000`0000004e 00000000`00000002 00000000`00004a90 00000000`0041f37f : nt!KeBugCheckEx
ffff808d`63291c90 fffff806`660fbdf0 : 00000000`00000002 00000000`00000000 ffff808d`00000000 00000000`00000000 : nt!MiUnlinkPageFromList+0xc89
ffff808d`63291d20 fffff806`6614c759 : ffff808d`63292060 ffff808d`632922b8 ffffca0f`3276e480 00000000`00000000 : nt!MiFlushSectionInternal+0x490
ffff808d`63291ff0 fffff806`66149635 : 00000000`00000000 ffffca0f`2c0cf080 00000000`00000000 00000000`00000000 : nt!MmFlushSection+0x155
ffff808d`632920a0 fffff806`660a4f0f : ffffca0f`2cb803b8 00000000`00000000 ffff8d06`00000000 00000000`00000000 : nt!CcFlushCachePriv+0x6a5
ffff808d`632921e0 fffff806`684b52bd : 00000000`00000005 00000000`00000000 00000000`00000000 ffff8d06`fcf3e170 : nt!CcCoherencyFlushAndPurgeCache+0x6f
ffff808d`63292230 fffff806`684b517b : ffff8d06`fcf3e170 00000000`00000000 ffff8d06`fcf3e001 ffffca0f`30f4f608 : Ntfs!NtfsCoherencyFlushAndPurgeCache+0x55
ffff808d`63292270 fffff806`683e8799 : ffffca0f`30f4f608 ffff8d06`fcf3e170 00000000`00000000 ffff8d06`fcf3e010 : Ntfs!NtfsFlushUserStream+0xa3
ffff808d`63292300 fffff806`6851f6f5 : ffffca0f`30f4f608 ffffca0f`25ae0180 ffff8d06`fcf3e010 ffff808d`63292480 : Ntfs!NtfsFlushVolumeFlushSingleFcb+0x329
ffff808d`63292450 fffff806`684b6d1c : 00000000`00000000 00000000`00000000 ffffca0f`25ae0180 ffff8d06`e431d620 : Ntfs!NtfsFlushVolume+0x2bd
ffff808d`63292560 fffff806`684b5ef9 : ffffca0f`30f4f608 ffffca0f`2c372650 ffffca0f`30f4f601 ffff808d`63292790 : Ntfs!NtfsCommonFlushBuffers+0x8d0
ffff808d`63292680 fffff806`660b8908 : ffff808d`63292790 ffffca0f`30f4f608 ffffca0f`00000000 ffffca0f`2c372650 : Ntfs!NtfsCommonFlushBuffersCallout+0x19
ffff808d`632926b0 fffff806`660b887d : fffff806`684b5ee0 ffff808d`63292790 00000000`00000000 fffff806`00000000 : nt!KeExpandKernelStackAndCalloutInternal+0x78
ffff808d`63292720 fffff806`68510f9b : 00000000`00000000 00000000`00000310 ffff808d`63293000 00000000`00000030 : nt!KeExpandKernelStackAndCalloutEx+0x1d
ffff808d`63292760 fffff806`68510ec5 : 00000000`00000000 ffffca0f`251108c0 ffff808d`632927f8 00000000`00000000 : Ntfs!NtfsCommonFlushBuffersOnNewStack+0x67
ffff808d`632927d0 fffff806`660d1f35 : ffffca0f`337e7010 ffffca0f`2c372650 ffffca0f`30f4f608 ffff808d`632927f8 : Ntfs!NtfsFsdFlushBuffers+0xe5
ffff808d`63292840 fffff806`62416ccf : ffffca0f`20016380 ffff808d`00000030 ffff808d`00000000 ffff808d`63292b80 : nt!IofCallDriver+0x55
ffff808d`63292880 fffff806`624148d3 : ffff808d`63292910 00000000`00000000 00000000`00000000 ffffca0f`250fe240 : FLTMGR!FltpLegacyProcessingAfterPreCallbacksCompleted+0x28f
ffff808d`632928f0 fffff806`660d1f35 : ffffca0f`2c372650 00000000`000000c0 00000000`000000e0 00007ff7`32d3c100 : FLTMGR!FltpDispatch+0xa3
ffff808d`63292950 fffff806`664a6fb8 : ffffca0f`2c372650 00000000`00000000 00000000`00000000 fffff806`667b2094 : nt!IofCallDriver+0x55
ffff808d`63292990 fffff806`664530c9 : ffffca0f`00000000 ffff808d`63292b80 00000000`00000000 ffff808d`63292b80 : nt!IopSynchronousServiceTail+0x1a8
ffff808d`63292a30 fffff806`66452eb6 : ffffca0f`2c0cf080 00007ff7`32d3c310 ffffca0f`259aad60 00000000`00000000 : nt!NtFlushBuffersFileEx+0x1f9
ffff808d`63292ac0 fffff806`662058b8 : ffffca0f`2c0cf080 00000000`00000000 00000000`00000001 ffffca0f`00000000 : nt!NtFlushBuffersFile+0x16
ffff808d`63292b00 00007fff`2966c724 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x28
00000068`16eff698 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007fff`2966c724
SYMBOL_NAME: nt!MiUnlinkPageFromList+c89
MODULE_NAME: nt
IMAGE_VERSION: 10.0.19041.508
STACK_COMMAND: .thread ; .cxr ; kb
IMAGE_NAME: ntkrnlmp.exe
BUCKET_ID_FUNC_OFFSET: c89
FAILURE_BUCKET_ID: 0x4E_2_nt!MiUnlinkPageFromList
OS_VERSION: 10.0.19041.1
BUILDLAB_STR: vb_release
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {b084f841-86a9-e353-1d26-a04cfe7406b4}
Followup: MachineOwner
---------
VIDEO_MEMORY_MANAGEMENT_INTERNAL (10e)
The video memory manager encountered a condition that it can't recover from. By crashing,
the video memory manager is attempting to get enough information into the minidump such that
somebody can pinpoint what lead to this condition.
Arguments:
Arg1: 0000000000000033, The subtype of the bugcheck:
Arg2: ffffc382a50bddb0
Arg3: 0000000000000000
Arg4: 0000000000000000
Debugging Details:
------------------
*** WARNING: Unable to verify checksum for win32k.sys
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 8640
Key : Analysis.DebugAnalysisProvider.CPP
Value: Create: 8007007e on DESKTOP-62N06FT
Key : Analysis.DebugData
Value: CreateObject
Key : Analysis.DebugModel
Value: CreateObject
Key : Analysis.Elapsed.mSec
Value: 27245
Key : Analysis.Memory.CommitPeak.Mb
Value: 90
Key : Analysis.System
Value: CreateObject
Key : WER.OS.Branch
Value: vb_release
Key : WER.OS.Timestamp
Value: 2019-12-06T14:06:00Z
Key : WER.OS.Version
Value: 10.0.19041.1
ADDITIONAL_XML: 1
OS_BUILD_LAYERS: 1
BUGCHECK_CODE: 10e
BUGCHECK_P1: 33
BUGCHECK_P2: ffffc382a50bddb0
BUGCHECK_P3: 0
BUGCHECK_P4: 0
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: dwm.exe
STACK_TEXT:
fffffd00`0ed23088 fffff802`2d1b3ad0 : 00000000`0000010e 00000000`00000033 ffffc382`a50bddb0 00000000`00000000 : nt!KeBugCheckEx
fffffd00`0ed23090 fffff802`2ed17875 : 00000000`00000000 ffffc382`a50bdeb0 ffff9b8f`f4e03000 00000000`00000001 : watchdog!WdLogEvent5_WdCriticalError+0xe0
fffffd00`0ed230d0 fffff802`2ec8253a : ffffc382`a50bddb0 00000000`00000000 ffffc382`a4a3d050 00000000`00000001 : dxgmms2!VIDMM_PROCESS_ADAPTER_INFO::~VIDMM_PROCESS_ADAPTER_INFO+0x27799
fffffd00`0ed23110 fffff802`2ecf00b9 : ffffc382`a50bddb0 00000000`00000000 ffffc382`a4a3d050 ffff9b8f`f4c93010 : dxgmms2!VIDMM_PROCESS_ADAPTER_INFO::`scalar deleting destructor'+0xe
fffffd00`0ed23140 fffff802`2ecefb25 : 00000000`00000000 ffffc382`a4a3d050 ffffc382`a50bddb0 ffff9b8f`f691e080 : dxgmms2!VIDMM_PROCESS::DestroyAdapterInfo+0xe5
fffffd00`0ed23170 fffff802`2ec8257e : ffffc382`a4c4d710 fffffd00`0ed23329 ffff9b8f`f4c93010 01000000`00100000 : dxgmms2!VIDMM_PROCESS::CloseAdapter+0xb9
fffffd00`0ed23230 fffff802`2cf512d9 : 00000000`00000030 00000000`00000799 ffffc382`a4acaef8 00000000`00000000 : dxgmms2!VidMmCloseAdapter+0x1e
fffffd00`0ed23260 fffff802`2cf0720f : ffff9b8f`f3667000 00000000`00000000 ffff9b8f`f4f61f90 fffff802`21ce02a3 : dxgkrnl!DXGPROCESS_ADAPTER_INFO::CloseVidMmAdapter+0x2d
fffffd00`0ed23290 fffff802`2cee3031 : ffffc382`a4c4d710 ffffc382`00000002 ffffc382`a4c4d710 ffff9b8f`f4c93010 : dxgkrnl!DXGPROCESS::DestroyAdapterInfo+0x143
fffffd00`0ed23390 fffff802`2cee1171 : ffff9b8f`f4cb6000 fffff802`00000001 ffff9b8f`f4cb6000 fffff802`00000001 : dxgkrnl!DXGPROCESS::CloseAdapter+0xf9
fffffd00`0ed23420 fffff802`2cf0c699 : ffffc382`a4acaf10 fffffd00`0ed23570 00000000`00000261 ffffc382`a4acade0 : dxgkrnl!DXGADAPTER::DestroyHandle+0x11d
fffffd00`0ed23470 fffff802`2cf078b5 : ffffc382`a4acade0 00000000`00000b59 ffffc382`a4acade0 ffff9b8f`f68733f0 : dxgkrnl!DXGPROCESS::Destroy+0x341
fffffd00`0ed236e0 fffff802`2ce057c7 : 00000000`00000000 ffffc382`a4acade0 ffff9b8f`f2a96330 fffff802`226ec3c8 : dxgkrnl!DXGPROCESS::DestroyDxgProcess+0x105
fffffd00`0ed23830 fffff802`2209c5cf : 00000000`00000000 ffff9b8f`f691c080 00000000`0000ff00 ffff9b8f`f4bfea10 : dxgkrnl!DxgkProcessNotify+0xf7
fffffd00`0ed23890 fffff802`22101c84 : ffff9b8f`f691c000 ffff9b8f`f691c080 00000000`00000000 00000000`00000000 : nt!PspCallProcessNotifyRoutines+0x213
fffffd00`0ed23960 fffff802`2209ea46 : ffff9b8f`f691e4b8 00000000`00000000 00000000`00000000 00000000`00000000 : nt!PspExitProcess+0x70
fffffd00`0ed23990 fffff802`21ff3eae : ffff9b8f`d00002fe 00000000`00000001 00000000`00000000 00000086`4746e000 : nt!PspExitThread+0x5b2
fffffd00`0ed23a90 fffff802`21e058b8 : ffff9b8f`f691c080 ffff9b8f`f691e080 fffffd00`0ed23b80 ffff9b8f`f691c080 : nt!NtTerminateProcess+0xde
fffffd00`0ed23b00 00007ffe`a860c344 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x28
00000086`4728fce8 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffe`a860c344
SYMBOL_NAME: dxgmms2!VIDMM_PROCESS_ADAPTER_INFO::~VIDMM_PROCESS_ADAPTER_INFO+27799
MODULE_NAME: dxgmms2
IMAGE_NAME: dxgmms2.sys
IMAGE_VERSION: 10.0.19041.508
STACK_COMMAND: .thread ; .cxr ; kb
BUCKET_ID_FUNC_OFFSET: 27799
FAILURE_BUCKET_ID: 0x10e_33_dxgmms2!VIDMM_PROCESS_ADAPTER_INFO::_VIDMM_PROCESS_ADAPTER_INFO
OS_VERSION: 10.0.19041.1
BUILDLAB_STR: vb_release
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {590e82e4-fa32-3e14-0943-e6b01c6637c4}
Followup: MachineOwner
---------
MEMORY_MANAGEMENT (1a)
# Any other values for parameter 1 must be individually examined.
Arguments:
Arg1: 0000000000041792, A corrupt PTE has been detected. Parameter 2 contains the address of
the PTE. Parameters 3/4 contain the low/high parts of the PTE.
Arg2: ffffdabffcf91fc0
Arg3: 0000000020000000
Arg4: 0000000000000000
Debugging Details:
------------------
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 4015
Key : Analysis.DebugAnalysisProvider.CPP
Value: Create: 8007007e on DESKTOP-62N06FT
Key : Analysis.DebugData
Value: CreateObject
Key : Analysis.DebugModel
Value: CreateObject
Key : Analysis.Elapsed.mSec
Value: 7949
Key : Analysis.Memory.CommitPeak.Mb
Value: 79
Key : Analysis.System
Value: CreateObject
Key : WER.OS.Branch
Value: vb_release
Key : WER.OS.Timestamp
Value: 2019-12-06T14:06:00Z
Key : WER.OS.Version
Value: 10.0.19041.1
ADDITIONAL_XML: 1
OS_BUILD_LAYERS: 1
BUGCHECK_CODE: 1a
BUGCHECK_P1: 41792
BUGCHECK_P2: ffffdabffcf91fc0
BUGCHECK_P3: 20000000
BUGCHECK_P4: 0
MEMORY_CORRUPTOR: ONE_BIT
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXPNP: 1 (!blackboxpnp)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: chrome.exe
STACK_TEXT:
ffffdb03`48875dc8 fffff807`26b2abba : 00000000`0000001a 00000000`00041792 ffffdabf`fcf91fc0 00000000`20000000 : nt!KeBugCheckEx
ffffdb03`48875dd0 fffff807`26aedc06 : 00000000`00000000 ffffc606`7b3ab700 00000000`0000002c ffffdabf`fcf91fc0 : nt!MiDeleteVa+0x153a
ffffdb03`48875ed0 fffff807`26aedd1b : ffffdaed`00000000 ffffc606`7b3ab700 ffffdb03`00000000 ffffdb03`48876340 : nt!MiWalkPageTablesRecursively+0x776
ffffdb03`48875f70 fffff807`26aedd1b : ffffdaed`76afff38 ffffc606`7b3ab700 ffffdb03`00000001 ffffdb03`48876350 : nt!MiWalkPageTablesRecursively+0x88b
ffffdb03`48876010 fffff807`26aedd1b : ffffdaed`76aff000 ffffc606`7b3ab700 ffffdb03`00000002 ffffdb03`48876360 : nt!MiWalkPageTablesRecursively+0x88b
ffffdb03`488760b0 fffff807`26adcbfb : 00000000`00000000 ffffc606`7b3ab700 00000000`00000003 ffffdb03`48876370 : nt!MiWalkPageTablesRecursively+0x88b
ffffdb03`48876150 fffff807`26b29451 : ffffdb03`488762f0 ffffc606`00000000 ffffdabf`00000002 00000000`00000000 : nt!MiWalkPageTables+0x36b
ffffdb03`48876250 fffff807`26b01670 : 00000000`00000001 ffffdb03`00000000 ffffc606`7b3ab550 ffffc606`78aeb080 : nt!MiDeletePagablePteRange+0x4f1
ffffdb03`48876560 fffff807`26e999e9 : ffffc606`7c293ce0 00000000`00000000 ffffc606`00000000 ffffc606`00000000 : nt!MiDeleteVad+0x360
ffffdb03`48876670 fffff807`26e9938c : ffffc606`7c293ce0 ffffc606`7989b9a0 ffffc606`78aeb080 00000000`00000000 : nt!MiUnmapVad+0x49
ffffdb03`488766a0 fffff807`26ee4dd3 : ffffc606`7c2948c0 ffffc606`7c2948c0 ffffc606`7c293ce0 ffffc606`7b3ab080 : nt!MiCleanVad+0x30
ffffdb03`488766d0 fffff807`26e81f5f : ffffffff`00000000 ffffffff`ffffffff 00000000`00000001 ffffc606`7b3ab080 : nt!MmCleanProcessAddressSpace+0x137
ffffdb03`48876750 fffff807`26e9ea8a : ffffc606`7b3ab080 ffff9f04`6a93f060 ffffdb03`48876990 00000000`00000000 : nt!PspRundownSingleProcess+0x13b
ffffdb03`488767d0 fffff807`26df4558 : ffffc606`00000000 00000260`00000001 ffffdb03`488769e0 000000ff`41bbf000 : nt!PspExitThread+0x5f6
ffffdb03`488768d0 fffff807`26ae6ca7 : 00000000`406e0088 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSchedulerApcTerminate+0x38
ffffdb03`48876910 fffff807`26bf8440 : 000000ff`43bffb18 ffffdb03`488769c0 ffffdb03`48876b80 00000260`00000000 : nt!KiDeliverApc+0x487
ffffdb03`488769c0 fffff807`26c0595f : 00000000`00000001 ffffc606`77773080 ffffdb03`48876b18 ffffffff`ec549980 : nt!KiInitiateUserApc+0x70
ffffdb03`48876b00 00007ff9`f3f2be44 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceExit+0x9f
000000ff`43bffae8 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ff9`f3f2be44
MODULE_NAME: hardware
IMAGE_NAME: memory_corruption
STACK_COMMAND: .thread ; .cxr ; kb
FAILURE_BUCKET_ID: MEMORY_CORRUPTION_ONE_BIT
OS_VERSION: 10.0.19041.1
BUILDLAB_STR: vb_release
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {e3faf315-c3d0-81db-819a-6c43d23c63a7}
Followup: MachineOwner
---------
MEMORY_MANAGEMENT (1a)
# Any other values for parameter 1 must be individually examined.
Arguments:
Arg1: 0000000000041790, A page table page has been corrupted. On a 64 bit OS, parameter 2
contains the address of the PFN for the corrupted page table page.
On a 32 bit OS, parameter 2 contains a pointer to the number of used
PTEs, and parameter 3 contains the number of used PTEs.
Arg2: fffff28002386530
Arg3: 0000000000000000
Arg4: 0000000000000001
Debugging Details:
------------------
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 3593
Key : Analysis.DebugAnalysisProvider.CPP
Value: Create: 8007007e on DESKTOP-62N06FT
Key : Analysis.DebugData
Value: CreateObject
Key : Analysis.DebugModel
Value: CreateObject
Key : Analysis.Elapsed.mSec
Value: 8681
Key : Analysis.Memory.CommitPeak.Mb
Value: 79
Key : Analysis.System
Value: CreateObject
Key : WER.OS.Branch
Value: vb_release
Key : WER.OS.Timestamp
Value: 2019-12-06T14:06:00Z
Key : WER.OS.Version
Value: 10.0.19041.1
ADDITIONAL_XML: 1
OS_BUILD_LAYERS: 1
BUGCHECK_CODE: 1a
BUGCHECK_P1: 41790
BUGCHECK_P2: fffff28002386530
BUGCHECK_P3: 0
BUGCHECK_P4: 1
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXPNP: 1 (!blackboxpnp)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: chrome.exe
STACK_TEXT:
ffff8f04`f7733178 fffff803`4cb2abd5 : 00000000`0000001a 00000000`00041790 fffff280`02386530 00000000`00000000 : nt!KeBugCheckEx
ffff8f04`f7733180 fffff803`4cb293ef : ffff918c`bae9d700 00000000`00000000 ffff853b`00000002 00000000`00000000 : nt!MiDeleteVa+0x1555
ffff8f04`f7733280 fffff803`4cb01670 : 00000000`00000001 ffff8f04`00000000 ffff918c`bae9d550 ffff918c`b5417080 : nt!MiDeletePagablePteRange+0x48f
ffff8f04`f7733590 fffff803`4ce9939f : ffff918c`b5417080 00000000`00000000 ffff918c`00000000 ffff918c`00000000 : nt!MiDeleteVad+0x360
ffff8f04`f77336a0 fffff803`4cee4dd3 : ffff918c`b89682e0 ffff918c`b89682e0 ffff918c`b90d63c0 ffff918c`bae9d080 : nt!MiCleanVad+0x43
ffff8f04`f77336d0 fffff803`4ce81f5f : ffffffff`00000000 ffffffff`ffffffff 00000000`00000001 ffff918c`bae9d080 : nt!MmCleanProcessAddressSpace+0x137
ffff8f04`f7733750 fffff803`4ce9ea8a : ffff918c`bae9d080 ffffba82`c28c85f0 ffff8f04`f7733990 00000000`00000000 : nt!PspRundownSingleProcess+0x13b
ffff8f04`f77337d0 fffff803`4cdf4558 : ffff918c`00000000 00000000`00000001 ffff8f04`f77339e0 00000069`8d5de000 : nt!PspExitThread+0x5f6
ffff8f04`f77338d0 fffff803`4cae6ca7 : 00000000`40280088 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSchedulerApcTerminate+0x38
ffff8f04`f7733910 fffff803`4cbf8440 : 00000069`99dff818 ffff8f04`f77339c0 ffff8f04`f7733b80 00000258`00000000 : nt!KiDeliverApc+0x487
ffff8f04`f77339c0 fffff803`4cc0595f : ffff918c`b5417080 00000000`00000000 ffff8f04`f7733b18 ffffffff`ec549980 : nt!KiInitiateUserApc+0x70
ffff8f04`f7733b00 00007ff8`da06be44 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceExit+0x9f
00000069`99dff7e8 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ff8`da06be44
SYMBOL_NAME: nt!MiDeleteVa+1555
MODULE_NAME: nt
IMAGE_VERSION: 10.0.19041.508
STACK_COMMAND: .thread ; .cxr ; kb
IMAGE_NAME: ntkrnlmp.exe
BUCKET_ID_FUNC_OFFSET: 1555
FAILURE_BUCKET_ID: 0x1a_41790_nt!MiDeleteVa
OS_VERSION: 10.0.19041.1
BUILDLAB_STR: vb_release
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {9b5ebc95-f4cf-8c11-5593-7f5337165669}
Followup: MachineOwner
---------