*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
SYSTEM_SERVICE_EXCEPTION (3b)
An exception happened while executing a system service routine.
Arguments:
Arg1: 00000000c0000005, Exception code that caused the BugCheck
Arg2: fffff8004642af64, Address of the instruction which caused the BugCheck
Arg3: ffffbb8330e965e0, Address of the context record for the exception that caused the BugCheck
Arg4: 0000000000000000, zero.
Debugging Details:
------------------
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 2250
Key : Analysis.Elapsed.mSec
Value: 4019
Key : Analysis.IO.Other.Mb
Value: 0
Key : Analysis.IO.Read.Mb
Value: 0
Key : Analysis.IO.Write.Mb
Value: 0
Key : Analysis.Init.CPU.mSec
Value: 78
Key : Analysis.Init.Elapsed.mSec
Value: 1897
Key : Analysis.Memory.CommitPeak.Mb
Value: 146
Key : Bugcheck.Code.LegacyAPI
Value: 0x3b
Key : Failure.Bucket
Value: AV_nt!SeSecurityAttributePresent
Key : Failure.Hash
Value: {7e7b84b7-f955-9324-40d2-33d6e3a087f4}
Key : WER.OS.Branch
Value: vb_release
Key : WER.OS.Version
Value: 10.0.19041.1
BUGCHECK_CODE: 3b
BUGCHECK_P1: c0000005
BUGCHECK_P2: fffff8004642af64
BUGCHECK_P3: ffffbb8330e965e0
BUGCHECK_P4: 0
FILE_IN_CAB: 060323-12437-01.dmp
CONTEXT: ffffbb8330e965e0 -- (.cxr 0xffffbb8330e965e0)
rax=ffffe38349ed0040 rbx=ffffbd8b6a4f12f0 rcx=ffffbd8b6a4f12f0
rdx=fffff80046b86b08 rsi=fffff80046b86b08 rdi=081339281ae7250e
rip=fffff8004642af64 rsp=ffffbb8330e96fe0 rbp=ffffbb8330e97a80
r8=0000000000000007 r9=7fffe38348d6d4b8 r10=7ffffffffffffffc
r11=ffffbb8330e97000 r12=0000000000000000 r13=0000000000000000
r14=00005a7c006b7778 r15=ffffe38348d6d080
iopl=0 nv up ei ng nz ac po cy
cs=0010 ss=0018 ds=002b es=002b fs=0053 gs=002b efl=00050297
nt!SeSecurityAttributePresent+0x34:
fffff800`4642af64 0fb7471a movzx eax,word ptr [rdi+1Ah] ds:002b:08133928`1ae72528=????
Resetting default scope
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXPNP: 1 (!blackboxpnp)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: opera_crashreporter.exe
STACK_TEXT:
ffffbb83`30e96fe0 fffff800`4681243b : 00005a7c`006b7778 00005a7c`006b7778 ffffe383`48d6d538 00000000`00000000 : nt!SeSecurityAttributePresent+0x34
ffffbb83`30e97020 fffff800`46809037 : ffff8a80`00000000 00000000`00048de0 00007ff6`d42aed00 00000000`00000000 : nt!ExpGetProcessInformation+0x20b
ffffbb83`30e97680 fffff800`468081e7 : 00000067`8affe9a8 00000000`00000390 00000000`00001000 00000000`00004000 : nt!ExpQuerySystemInformation+0xd07
ffffbb83`30e979c0 fffff800`4660f7f5 : 00000000`00000000 ffffe383`00000001 00000000`00000014 ffffe383`00000000 : nt!NtQuerySystemInformation+0x37
ffffbb83`30e97a00 00007ffb`212cd774 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x25
00000067`8affe8a8 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffb`212cd774
SYMBOL_NAME: nt!SeSecurityAttributePresent+34
MODULE_NAME: nt
IMAGE_NAME: ntkrnlmp.exe
IMAGE_VERSION: 10.0.19041.3031
STACK_COMMAND: .cxr 0xffffbb8330e965e0 ; kb
BUCKET_ID_FUNC_OFFSET: 34
FAILURE_BUCKET_ID: AV_nt!SeSecurityAttributePresent
OS_VERSION: 10.0.19041.1
BUILDLAB_STR: vb_release
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {7e7b84b7-f955-9324-40d2-33d6e3a087f4}
Followup: MachineOwner
---------
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
DRIVER_IRQL_NOT_LESS_OR_EQUAL (d1)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high. This is usually
caused by drivers using improper addresses.
If kernel debugger is available get stack backtrace.
Arguments:
Arg1: fffff8006b721530, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000008, value 0 = read operation, 1 = write operation
Arg4: fffff8006b721530, address which referenced memory
Debugging Details:
------------------
*** WARNING: Unable to verify timestamp for e1d68x64.sys
*** WARNING: Check Image - Checksum mismatch - Dump: 0xf26c5, File: 0xf2821 - C:\ProgramData\Dbg\sym\wdiwifi.sys\91B1BEE2f2000\wdiwifi.sys
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 1608
Key : Analysis.Elapsed.mSec
Value: 8243
Key : Analysis.IO.Other.Mb
Value: 0
Key : Analysis.IO.Read.Mb
Value: 0
Key : Analysis.IO.Write.Mb
Value: 0
Key : Analysis.Init.CPU.mSec
Value: 202
Key : Analysis.Init.Elapsed.mSec
Value: 2127
Key : Analysis.Memory.CommitPeak.Mb
Value: 145
Key : Bugcheck.Code.LegacyAPI
Value: 0xd1
Key : Failure.Bucket
Value: AV_CODE_AV_BAD_IP_fwpkclnt!FwpiGetValueFromClassifyContext
Key : Failure.Hash
Value: {01dad8e8-e830-0167-df0d-fc951cf4afe0}
Key : WER.OS.Branch
Value: vb_release
Key : WER.OS.Version
Value: 10.0.19041.1
BUGCHECK_CODE: d1
BUGCHECK_P1: fffff8006b721530
BUGCHECK_P2: 2
BUGCHECK_P3: 8
BUGCHECK_P4: fffff8006b721530
FILE_IN_CAB: 060323-20718-01.dmp
READ_ADDRESS: fffff800298fb390: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
unable to get nt!MmSpecialPagesInUse
fffff8006b721530
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXPNP: 1 (!blackboxpnp)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: System
TRAP_FRAME: ffffb2082da36fb0 -- (.trap 0xffffb2082da36fb0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=fffff8006b721530 rbx=0000000000000000 rcx=0000000000000000
rdx=0000000000000006 rsi=0000000000000000 rdi=0000000000000000
rip=fffff8006b721530 rsp=ffffb2082da37148 rbp=ffffb2082da372b9
r8=ffffb2082da37350 r9=0000000000000000 r10=0000000000000050
r11=ffffb2082da371f8 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei ng nz ac po cy
fffff800`6b721530 ?? ???
Resetting default scope
FAILED_INSTRUCTION_ADDRESS:
+0
fffff800`6b721530 ?? ???
STACK_TEXT:
ffffb208`2da36e68 fffff800`29010029 : 00000000`0000000a fffff800`6b721530 00000000`00000002 00000000`00000008 : nt!KeBugCheckEx
ffffb208`2da36e70 fffff800`2900bbe3 : 00000000`00000002 00000000`00000000 ffffe605`363523c0 fffff800`28ead488 : nt!KiBugCheckDispatch+0x69
ffffb208`2da36fb0 fffff800`6b721530 : fffff800`2f6a1599 ffffe605`4da33840 00000001`00000000 ffffe605`4da33840 : nt!KiPageFault+0x463
ffffb208`2da37148 fffff800`2f6a1599 : ffffe605`4da33840 00000001`00000000 ffffe605`4da33840 fffff800`34fe1168 : 0xfffff800`6b721530
ffffb208`2da37150 fffff800`34fd45ac : fffff800`2f42b630 00000000`00000000 00000000`00000000 00000000`00000000 : fwpkclnt!FwpiGetValueFromClassifyContext+0x39
ffffb208`2da371a0 fffff800`2f2e8f4f : 00000000`00000000 ffffb208`2da372b9 00000000`00000000 ffffb208`2da373b8 : Ndu!NduInboundMacClassify+0x7c
ffffb208`2da37250 fffff800`2f7214d5 : 00000000`00000000 00000000`00000000 ffffe605`4db3b840 00000000`00000050 : NETIO!KfdClassify2+0x19f
ffffb208`2da37320 fffff800`2f721270 : ffffe605`4df96bf0 00000000`00000000 00000000`00000000 00000000`00000001 : wfplwfs!L2InspectNetBufferListsFast+0x165
ffffb208`2da37430 fffff800`2f167ef1 : ffffe605`00000001 ffffe605`4db3b840 ffffe605`4d6da1a0 00000000`00000001 : wfplwfs!LwfLowerRecvNetBufferLists+0xd0
ffffb208`2da374f0 fffff800`2f19df58 : ffffe605`4da24500 ffffb208`2da375c1 ffffb208`2da37588 00000000`00000000 : ndis!ndisCallReceiveHandler+0x61
ffffb208`2da37540 fffff800`2f164a94 : 00000000`0000c986 00000000`00000801 ffffe605`4d6da1a0 00000000`00000001 : ndis!ndisInvokeNextReceiveHandler+0x148
ffffb208`2da37610 fffff800`3e4996bf : 00000000`00000000 00000000`00000801 00000000`00000001 ffffe605`4db3b840 : ndis!NdisMIndicateReceiveNetBufferLists+0x104
ffffb208`2da376a0 00000000`00000000 : 00000000`00000801 00000000`00000001 ffffe605`4db3b840 00000000`00000801 : e1d68x64+0x196bf
SYMBOL_NAME: fwpkclnt!FwpiGetValueFromClassifyContext+39
MODULE_NAME: fwpkclnt
IMAGE_NAME: fwpkclnt.sys
IMAGE_VERSION: 10.0.19041.2965
STACK_COMMAND: .cxr; .ecxr ; kb
BUCKET_ID_FUNC_OFFSET: 39
FAILURE_BUCKET_ID: AV_CODE_AV_BAD_IP_fwpkclnt!FwpiGetValueFromClassifyContext
OS_VERSION: 10.0.19041.1
BUILDLAB_STR: vb_release
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {01dad8e8-e830-0167-df0d-fc951cf4afe0}
Followup: MachineOwner
---------
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
PAGE_FAULT_IN_NONPAGED_AREA (50)
Invalid system memory was referenced. This cannot be protected by try-except.
Typically the address is just plain bad or it is pointing at freed memory.
Arguments:
Arg1: ffffca2e03850730, memory referenced.
Arg2: 0000000000000000, X64: bit 0 set if the fault was due to a not-present PTE.
bit 1 is set if the fault was due to a write, clear if a read.
bit 3 is set if the processor decided the fault was due to a corrupted PTE.
bit 4 is set if the fault was due to attempted execute of a no-execute PTE.
- ARM64: bit 1 is set if the fault was due to a write, clear if a read.
bit 3 is set if the fault was due to attempted execute of a no-execute PTE.
Arg3: ffffca560d73e849, If non-zero, the instruction address which referenced the bad memory
address.
Arg4: 0000000000000002, (reserved)
Debugging Details:
------------------
KEY_VALUES_STRING: 1
Key : AV.Type
Value: Read
Key : Analysis.CPU.mSec
Value: 1796
Key : Analysis.Elapsed.mSec
Value: 4332
Key : Analysis.IO.Other.Mb
Value: 6
Key : Analysis.IO.Read.Mb
Value: 0
Key : Analysis.IO.Write.Mb
Value: 7
Key : Analysis.Init.CPU.mSec
Value: 202
Key : Analysis.Init.Elapsed.mSec
Value: 5274
Key : Analysis.Memory.CommitPeak.Mb
Value: 154
Key : Bugcheck.Code.LegacyAPI
Value: 0x50
Key : Failure.Bucket
Value: AV_R_(null)_win32kfull!zzzUpdateCursorImage
Key : Failure.Hash
Value: {246d3a00-0653-53df-a524-a724a001fd24}
Key : WER.OS.Branch
Value: vb_release
Key : WER.OS.Version
Value: 10.0.19041.1
BUGCHECK_CODE: 50
BUGCHECK_P1: ffffca2e03850730
BUGCHECK_P2: 0
BUGCHECK_P3: ffffca560d73e849
BUGCHECK_P4: 2
FILE_IN_CAB: 060323-12703-01.dmp
READ_ADDRESS: fffff801220fb390: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
unable to get nt!MmSpecialPagesInUse
ffffca2e03850730
MM_INTERNAL_CODE: 2
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXPNP: 1 (!blackboxpnp)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: csrss.exe
TRAP_FRAME: ffff840829eca3c0 -- (.trap 0xffff840829eca3c0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=ffffca560d645b00 rbx=0000000000000000 rcx=ffffca2ec669a801
rdx=0000000000007feb rsi=0000000000000000 rdi=0000000000000000
rip=ffffca560d73e849 rsp=ffff840829eca550 rbp=0000000000000000
r8=00000000000006b5 r9=0000000000000000 r10=fffff78000000004
r11=ffff840829eca690 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei ng nz na pe nc
win32kfull!zzzUpdateCursorImage+0x319:
ffffca56`0d73e849 8b4750 mov eax,dword ptr [rdi+50h] ds:00000000`00000050=????????
Resetting default scope
STACK_TEXT:
ffff8408`29eca118 fffff801`2184af53 : 00000000`00000050 ffffca2e`03850730 00000000`00000000 ffff8408`29eca3c0 : nt!KeBugCheckEx
ffff8408`29eca120 fffff801`2166e7b0 : 00000000`00000000 00000000`00000000 ffff8408`29eca440 00000000`00000000 : nt!MiSystemFault+0x1b2563
ffff8408`29eca220 fffff801`2180bad8 : ffffa287`03a88080 fffff801`2161beef 00000000`00000007 00000000`00000006 : nt!MmAccessFault+0x400
ffff8408`29eca3c0 ffffca56`0d73e849 : ffffca2e`c061cd70 00000000`00000001 ffffca2e`c061cd70 ffffca2e`c08506e0 : nt!KiPageFault+0x358
ffff8408`29eca550 ffffca56`0d73dbb7 : ffffca2e`c65610a0 ffffca2e`c067b920 00000000`0000000d 00000000`00000214 : win32kfull!zzzUpdateCursorImage+0x319
ffff8408`29eca5b0 ffffca56`0d7c68b4 : ffffca2e`c65610a0 ffffca2e`c65610e8 ffffca2e`c65610e8 00000000`00000214 : win32kfull!zzzAnimateCursor+0x127
ffff8408`29eca620 ffffca56`0d7c61c6 : 00000000`00000010 00000000`000068cc 00000000`00000001 00000000`00000004 : win32kfull!TimersProc+0x3d4
ffff8408`29eca6b0 ffffca56`0d483884 : ffffa287`03a88080 ffffa287`03a88080 00000000`00000000 00000000`00000005 : win32kfull!RawInputThread+0x7f6
ffff8408`29eca870 ffffca56`0d707a31 : ffffa287`03a88080 00000000`00000000 00000000`00000005 00000000`00000005 : win32kbase!xxxCreateSystemThreads+0xc4
ffff8408`29eca9a0 ffffca56`0dd9474e : ffffa287`03a88080 ffffa287`03a88080 00000000`00000000 00000000`00000000 : win32kfull!NtUserCallNoParam+0x71
ffff8408`29eca9d0 fffff801`2180f7f5 : ffffa287`00000005 00000000`00000005 00000275`9f204f90 00000000`00000478 : win32k!NtUserCallNoParam+0x16
ffff8408`29ecaa00 00007ffc`b2e810e4 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x25
000000f8`6cc3fd78 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffc`b2e810e4
SYMBOL_NAME: win32kfull!zzzUpdateCursorImage+319
MODULE_NAME: win32kfull
IMAGE_NAME: win32kfull.sys
IMAGE_VERSION: 10.0.19041.3031
STACK_COMMAND: .cxr; .ecxr ; kb
BUCKET_ID_FUNC_OFFSET: 319
FAILURE_BUCKET_ID: AV_R_(null)_win32kfull!zzzUpdateCursorImage
OS_VERSION: 10.0.19041.1
BUILDLAB_STR: vb_release
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {246d3a00-0653-53df-a524-a724a001fd24}
Followup: MachineOwner
---------
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
SYSTEM_THREAD_EXCEPTION_NOT_HANDLED (7e)
This is a very common BugCheck. Usually the exception address pinpoints
the driver/function that caused the problem. Always note this address
as well as the link date of the driver/image that contains this address.
Arguments:
Arg1: ffffffffc0000005, The exception code that was not handled
Arg2: fffff80534b283b4, The address that the exception occurred at
Arg3: ffffe0058f1c6928, Exception Record Address
Arg4: ffffe0058f1c6160, Context Record Address
Debugging Details:
------------------
KEY_VALUES_STRING: 1
Key : AV.Dereference
Value: NullPtr
Key : AV.Fault
Value: Read
Key : Analysis.CPU.mSec
Value: 1359
Key : Analysis.Elapsed.mSec
Value: 1491
Key : Analysis.IO.Other.Mb
Value: 2
Key : Analysis.IO.Read.Mb
Value: 0
Key : Analysis.IO.Write.Mb
Value: 3
Key : Analysis.Init.CPU.mSec
Value: 171
Key : Analysis.Init.Elapsed.mSec
Value: 4598
Key : Analysis.Memory.CommitPeak.Mb
Value: 144
Key : Bugcheck.Code.LegacyAPI
Value: 0x1000007e
Key : Failure.Bucket
Value: IP_MISALIGNED_BTHport.sys
Key : Failure.Hash
Value: {73258635-05de-7a2f-8163-e43d1a80af40}
Key : WER.OS.Branch
Value: vb_release
Key : WER.OS.Version
Value: 10.0.19041.1
BUGCHECK_CODE: 7e
BUGCHECK_P1: ffffffffc0000005
BUGCHECK_P2: fffff80534b283b4
BUGCHECK_P3: ffffe0058f1c6928
BUGCHECK_P4: ffffe0058f1c6160
FILE_IN_CAB: 060323-22171-01.dmp
EXCEPTION_RECORD: ffffe0058f1c6928 -- (.exr 0xffffe0058f1c6928)
ExceptionAddress: fffff80534b283b4 (BTHport!HCI_DibGetStoredSSPData+0x0000000000000148)
ExceptionCode: c0000005 (Access violation)
ExceptionFlags: 00000000
NumberParameters: 2
Parameter[0]: 0000000000000000
Parameter[1]: 0000000000000000
Attempt to read from address 0000000000000000
CONTEXT: ffffe0058f1c6160 -- (.cxr 0xffffe0058f1c6160)
rax=0000000000000000 rbx=ffffe58389e69010 rcx=48442eecca590000
rdx=0000000000000000 rsi=0000000000000001 rdi=0000000000000000
rip=fffff80534b283b4 rsp=ffffe0058f1c6b60 rbp=ffffe0058f1c6bc9
r8=ffffe5838df519f0 r9=0000000000000000 r10=ffffe58388e7d6e0
r11=ffffe583a251e640 r12=0000000000000000 r13=ffffe58389e69390
r14=ffffe58389e69010 r15=ffffe0058f1c6e00
iopl=0 nv up ei pl zr na po nc
cs=0010 ss=0018 ds=002b es=002b fs=0053 gs=002b efl=00050246
BTHport!HCI_DibGetStoredSSPData+0x148:
fffff805`34b283b4 3807 cmp byte ptr [rdi],al ds:002b:00000000`00000000=??
Resetting default scope
BLACKBOXNTFS: 1 (!blackboxntfs)
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: System
READ_ADDRESS: fffff8052d0fb390: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
unable to get nt!MmSpecialPagesInUse
0000000000000000
ERROR_CODE: (NTSTATUS) 0xc0000005 - 0x%p adresindeki y nerge 0x%p adresindeki belle e ba vurdu. Bellek u olamaz %s.
EXCEPTION_CODE_STR: c0000005
EXCEPTION_PARAMETER1: 0000000000000000
EXCEPTION_PARAMETER2: 0000000000000000
MISALIGNED_IP:
BTHport!HCI_DibGetStoredSSPData+148
fffff805`34b283b4 3807 cmp byte ptr [rdi],al
EXCEPTION_STR: 0xc0000005
STACK_TEXT:
ffffe005`8f1c6b60 fffff805`34a44107 : ffffe583`89e69010 00000000`00000001 00000000`00000000 ffffe583`89e69010 : BTHport!HCI_DibGetStoredSSPData+0x148
ffffe005`8f1c6c30 fffff805`34a47bc2 : ffff25fd`990fa5eb 00000000`00000001 000071fc`dd838000 000071fc`dd838000 : BTHport!HCI_AddStoredDeviceToList+0x167
ffffe005`8f1c6e50 fffff805`34a47d0d : 00000000`00000010 000071fc`dd83804a 00000000`00000000 00000000`00000000 : BTHport!HCI_TransferStoredDeviceInfoToList+0xee
ffffe005`8f1c71f0 fffff805`34b28a5e : 00000000`00000000 00001f80`01080010 00000000`c0000034 00000000`00000000 : BTHport!HCI_ProcessStoredDevice+0x111
ffffe005`8f1c72f0 fffff805`34b28cf4 : ffffffff`8000030c 00000000`00000000 00000000`00000010 00000000`00000000 : BTHport!HCI_AddStoredDevicesWorker+0xfe
ffffe005`8f1c7410 fffff805`34a5b739 : 00000000`00000000 00000000`00000002 00000000`00000000 ffffe005`8f1c7590 : BTHport!HCI_AddStoredDevices+0xa0
ffffe005`8f1c7470 fffff805`34a5d886 : ffffe583`a2352000 ffffe005`8f1c75e0 ffffe583`a251f920 fffff805`2c6dfad3 : BTHport!HCI_PrepareNextInitCommand+0x1c5
ffffe005`8f1c74e0 fffff805`34a21781 : ffffe583`a20f89e0 ffffe583`89fff490 ffffe583`89fff490 ffffe583`a20f89e0 : BTHport!HCI_CriticalCallback+0xac6
ffffe005`8f1c7780 fffff805`34b2a4d7 : ffffe583`a2352000 ffffe583`a235200e 00000000`00000000 00000000`00000000 : BTHport!HCI_DoCmdCompletion+0x595
ffffe005`8f1c78c0 fffff805`34b37db8 : ffffe583`89feee90 ffffe583`a2352000 00000000`00000001 ffffe583`a2352000 : BTHport!HCI_ProcessEvent+0xab
ffffe005`8f1c7900 fffff805`34a871ef : ffffe583`89feee90 ffffe005`8f1c7a60 ffffe583`a23524e8 ffffe583`00000002 : BTHport!HCI_ProcessBip+0x78
ffffe005`8f1c7960 fffff805`2c7268f5 : ffffe583`a251e640 ffffe583`a251e640 fffff805`34a86900 ffffe583`a2352000 : BTHport!HCI_ThreadFunction+0x8ef
ffffe005`8f1c7b10 fffff805`2c804bf8 : fffff805`279a3180 ffffe583`a251e640 fffff805`2c7268a0 00000000`00000000 : nt!PspSystemThreadStartup+0x55
ffffe005`8f1c7b60 00000000`00000000 : ffffe005`8f1c8000 ffffe005`8f1c1000 00000000`00000000 00000000`00000000 : nt!KiStartSystemThread+0x28
SYMBOL_NAME: BTHport!HCI_DibGetStoredSSPData+148
IMAGE_NAME: hardware
IMAGE_VERSION: 10.0.19041.2965
STACK_COMMAND: .cxr 0xffffe0058f1c6160 ; kb
MODULE_NAME: hardware
FAILURE_BUCKET_ID: IP_MISALIGNED_BTHport.sys
OS_VERSION: 10.0.19041.1
BUILDLAB_STR: vb_release
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {73258635-05de-7a2f-8163-e43d1a80af40}
Followup: MachineOwner
---------
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
PAGE_FAULT_IN_NONPAGED_AREA (50)
Invalid system memory was referenced. This cannot be protected by try-except.
Typically the address is just plain bad or it is pointing at freed memory.
Arguments:
Arg1: ffffabd565967020, memory referenced.
Arg2: 0000000000000000, X64: bit 0 set if the fault was due to a not-present PTE.
bit 1 is set if the fault was due to a write, clear if a read.
bit 3 is set if the processor decided the fault was due to a corrupted PTE.
bit 4 is set if the fault was due to attempted execute of a no-execute PTE.
- ARM64: bit 1 is set if the fault was due to a write, clear if a read.
bit 3 is set if the fault was due to attempted execute of a no-execute PTE.
Arg3: ffffabd59972ff75, If non-zero, the instruction address which referenced the bad memory
address.
Arg4: 0000000000000002, (reserved)
Debugging Details:
------------------
KEY_VALUES_STRING: 1
Key : AV.Type
Value: Read
Key : Analysis.CPU.mSec
Value: 1796
Key : Analysis.Elapsed.mSec
Value: 1888
Key : Analysis.IO.Other.Mb
Value: 0
Key : Analysis.IO.Read.Mb
Value: 0
Key : Analysis.IO.Write.Mb
Value: 0
Key : Analysis.Init.CPU.mSec
Value: 217
Key : Analysis.Init.Elapsed.mSec
Value: 2091
Key : Analysis.Memory.CommitPeak.Mb
Value: 145
Key : Bugcheck.Code.LegacyAPI
Value: 0x50
Key : Failure.Bucket
Value: AV_R_(null)_win32kfull!LeaveEnterCrit::LeaveEnterCrit
Key : Failure.Hash
Value: {6ac1f0bd-0b32-4363-730e-abd6d3de52d8}
Key : WER.OS.Branch
Value: vb_release
Key : WER.OS.Version
Value: 10.0.19041.1
BUGCHECK_CODE: 50
BUGCHECK_P1: ffffabd565967020
BUGCHECK_P2: 0
BUGCHECK_P3: ffffabd59972ff75
BUGCHECK_P4: 2
FILE_IN_CAB: 053123-11937-01.dmp
READ_ADDRESS: fffff805276fb390: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
unable to get nt!MmSpecialPagesInUse
ffffabd565967020
MM_INTERNAL_CODE: 2
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXPNP: 1 (!blackboxpnp)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: steam.exe
TRAP_FRAME: ffff9e035f947130 -- (.trap 0xffff9e035f947130)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=ffffabd59a738d08 rbx=0000000000000000 rcx=ffff9e035f947420
rdx=00000000003c1f3c rsi=0000000000000000 rdi=0000000000000000
rip=ffffabd59972ff75 rsp=ffff9e035f9472c0 rbp=0000000000000000
r8=0000000000000001 r9=7fffab8dc0613860 r10=7ffffffffffffffc
r11=ffff9e035f9473e0 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei pl nz na pe nc
win32kfull!LeaveEnterCrit::LeaveEnterCrit+0x9:
ffffabd5`9972ff75 48ff15a4702300 call qword ptr [win32kfull!_imp_UserSessionSwitchLeaveCrit (ffffabd5`99967020)] ds:ffffabd5`99967020=????????????????
Resetting default scope
STACK_TEXT:
ffff9e03`5f946e88 fffff805`26e4af53 : 00000000`00000050 ffffabd5`65967020 00000000`00000000 ffff9e03`5f947130 : nt!KeBugCheckEx
ffff9e03`5f946e90 fffff805`26c6e7b0 : 00000000`0000001a 00000000`00000000 ffff9e03`5f9471b0 00000000`00000000 : nt!MiSystemFault+0x1b2563
ffff9e03`5f946f90 fffff805`26e0bad8 : 00000000`00000000 00000000`00000000 00000000`00000000 fffff805`26c0f69e : nt!MmAccessFault+0x400
ffff9e03`5f947130 ffffabd5`9972ff75 : ffffab8d`c65aa000 00000000`00000000 ffff9e03`00000000 00000000`00000000 : nt!KiPageFault+0x358
ffff9e03`5f9472c0 ffffabd5`9962bb1e : ffffab8d`c65aa010 ffffab8d`c65aa010 00000000`00000000 00000000`00000000 : win32kfull!LeaveEnterCrit::LeaveEnterCrit+0x9
ffff9e03`5f9472f0 ffffabd5`9962b725 : 00000000`00003dff ffffab8d`c65a0000 00000000`00000001 ffffabd5`00000000 : win32kfull!xxxRealSleepThread+0x32e
ffff9e03`5f947410 ffffabd5`99629cad : ffff9e03`5f947a80 00000000`00000000 ffff9e03`5f947978 ffffab8d`c65aa010 : win32kfull!xxxSleepThread2+0xb5
ffff9e03`5f947460 ffffabd5`99628d72 : ffff9e03`5f947978 00000000`00addf00 00000000`00000000 00000000`00000000 : win32kfull!xxxRealInternalGetMessage+0xcfd
ffff9e03`5f947930 ffffabd5`994d6276 : ffffd582`07528080 00007ffa`8b9b3970 00000000`00000020 00000000`00bdeca8 : win32kfull!NtUserGetMessage+0x92
ffff9e03`5f9479c0 fffff805`26e0f7f5 : 00000000`00000000 ffffd582`00000001 ffff9e03`5f947a18 00000000`00000000 : win32k!NtUserGetMessage+0x16
ffff9e03`5f947a00 00007ffa`8b9c0014 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x25
00000000`00addf28 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffa`8b9c0014
SYMBOL_NAME: win32kfull!LeaveEnterCrit::LeaveEnterCrit+9
MODULE_NAME: win32kfull
IMAGE_NAME: win32kfull.sys
IMAGE_VERSION: 10.0.19041.3031
STACK_COMMAND: .cxr; .ecxr ; kb
BUCKET_ID_FUNC_OFFSET: 9
FAILURE_BUCKET_ID: AV_R_(null)_win32kfull!LeaveEnterCrit::LeaveEnterCrit
OS_VERSION: 10.0.19041.1
BUILDLAB_STR: vb_release
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {6ac1f0bd-0b32-4363-730e-abd6d3de52d8}
Followup: MachineOwner
---------