PAGE_FAULT_IN_NONPAGED_AREA (50)
Invalid system memory was referenced. This cannot be protected by try-except.
Typically the address is just plain bad or it is pointing at freed memory.
Arguments:
Arg1: ffffd900f59fc520, memory referenced.
Arg2: 0000000000000000, value 0 = read operation, 1 = write operation.
Arg3: fffff8010d2d9147, If non-zero, the instruction address which referenced the bad memory
address.
Arg4: 0000000000000002, (reserved)
Debugging Details:
------------------
Could not read faulting driver name
KEY_VALUES_STRING: 1
Key : Analysis.CPU.Sec
Value: 2
Key : Analysis.DebugAnalysisProvider.CPP
Value: Create: 8007007e on DESKTOP-G25IS1E
Key : Analysis.DebugData
Value: CreateObject
Key : Analysis.DebugModel
Value: CreateObject
Key : Analysis.Elapsed.Sec
Value: 13
Key : Analysis.Memory.CommitPeak.Mb
Value: 68
Key : Analysis.System
Value: CreateObject
ADDITIONAL_XML: 1
BUGCHECK_CODE: 50
BUGCHECK_P1: ffffd900f59fc520
BUGCHECK_P2: 0
BUGCHECK_P3: fffff8010d2d9147
BUGCHECK_P4: 2
READ_ADDRESS: fffff8010d678358: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
fffff8010d5d1ff0: Unable to get Flags value from nt!KdVersionBlock
ffffd900f59fc520
MM_INTERNAL_CODE: 2
BLACKBOXBSD: 1 (!blackboxbsd)
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: svchost.exe
TRAP_FRAME: ffff8f0109cca040 -- (.trap 0xffff8f0109cca040)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=ffffd900f59fc520 rbx=0000000000000000 rcx=ffff8f0109cca390
rdx=0000024416c5d7df rsi=0000000000000000 rdi=0000000000000000
rip=fffff8010d2d9147 rsp=ffff8f0109cca1d0 rbp=ffff8f0109cca8a0
r8=0000000000000000 r9=0000000000001000 r10=fffff8010d6157c0
r11=0000024416c5d7df r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei ng nz ac pe nc
nt!MiMakePageAvoidRead+0x87:
fffff801`0d2d9147 4c8b28 mov r13,qword ptr [rax] ds:ffffd900`f59fc520=????????????????
Resetting default scope
STACK_TEXT:
ffff8f01`09cc9da8 fffff801`0d438f32 : 00000000`00000050 ffffd900`f59fc520 00000000`00000000 ffff8f01`09cca040 : nt!KeBugCheckEx
ffff8f01`09cc9db0 fffff801`0d324246 : 00000000`00000000 ffffd900`f59fc520 ffff8f01`09cca040 ffffd901`f55d7080 : nt!MiSystemFault+0x116e92
ffff8f01`09cc9e50 fffff801`0d40cc72 : ffffe947`80000000 00000000`00000014 00000000`00000002 00000000`00000000 : nt!MmAccessFault+0xae6
ffff8f01`09cca040 fffff801`0d2d9147 : fffffb80`0335a330 fffffb80`0335a330 ffff8f01`09cca8a0 00000000`00000000 : nt!KiPageFault+0x132
ffff8f01`09cca1d0 fffff801`0d2d8a86 : 0a000000`578c3963 00000000`00023861 00000000`00000000 00000000`1daa3861 : nt!MiMakePageAvoidRead+0x87
ffff8f01`09cca350 fffff801`0d2d81bf : 00000000`00000000 00000244`16c5d7df ffff8f01`00000000 ffff8f01`09cca411 : nt!MmCopyToCachedPage+0x186
ffff8f01`09cca420 fffff801`0d2d7541 : ffffd901`f5f8eae0 00000244`16c5d7df ffff8f01`09cca5e0 00000000`00000000 : nt!CcMapAndCopyInToCache+0x31f
ffff8f01`09cca580 fffff800`e3d05566 : ffff9f03`776f1c28 ffff8f01`09cca800 ffffd901`00000000 ffff9f03`776f1c00 : nt!CcCopyWriteEx+0x111
ffff8f01`09cca600 fffff800`e3d04574 : ffffd901`f6c0b298 00000000`00000000 00000000`00000000 ffffd901`f6c0b298 : NTFS!NtfsCommonWrite+0xd26
ffff8f01`09cca870 fffff800`e371563d : ffffd901`f7c7f010 ffffd901`f55e9b40 ffffd901`f4d92960 ffffd901`f55e9f70 : NTFS!NtfsFsdWrite+0x1d4
ffff8f01`09cca930 fffff800`e37134d6 : ffff8f01`09cca9c0 00000000`00000001 ffff8f01`09ccaa1c 00000000`00000001 : FLTMGR!FltpLegacyProcessingAfterPreCallbacksCompleted+0x18d
ffff8f01`09cca9a0 fffff801`0d72d6af : ffffd901`f3b79ab0 ffffd901`f55e9b40 ffffd901`f55e9fb8 00000001`00000000 : FLTMGR!FltpDispatch+0xb6
ffff8f01`09ccaa00 fffff801`0d7569b8 : ffff9f03`00000001 00000000`00000004 ffffd901`f33f5220 ffff8f01`09ccacc0 : nt!IopSynchronousServiceTail+0x1af
ffff8f01`09ccaac0 fffff801`0d40e313 : 00000000`746c6644 00000000`00000000 00000000`00000000 00000244`16c09d70 : nt!NtWriteFile+0x6d8
ffff8f01`09ccabd0 00007ffc`dd0d54b4 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x13
000000e1`457ff698 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffc`dd0d54b4
SYMBOL_NAME: nt!MiMakePageAvoidRead+87
MODULE_NAME: nt
IMAGE_VERSION: 10.0.15063.413
STACK_COMMAND: .thread ; .cxr ; kb
IMAGE_NAME: memory_corruption
BUCKET_ID_FUNC_OFFSET: 87
FAILURE_BUCKET_ID: AV_R_INVALID_nt!MiMakePageAvoidRead
OS_VERSION: 10.0.15063.0
BUILDLAB_STR: rs2_release
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {c63fd351-30dc-f312-e8b5-c37b331b82b6}
Followup: MachineOwner
---------
KMODE_EXCEPTION_NOT_HANDLED (1e)
This is a very common bugcheck. Usually the exception address pinpoints
the driver/function that caused the problem. Always note this address
as well as the link date of the driver/image that contains this address.
Arguments:
Arg1: ffffffffc0000005, The exception code that was not handled
Arg2: fffff80161e8d2e1, The address that the exception occurred at
Arg3: 0000000000000000, Parameter 0 of the exception
Arg4: ffffffffffffffff, Parameter 1 of the exception
Debugging Details:
------------------
KEY_VALUES_STRING: 1
Key : Analysis.CPU.Sec
Value: 2
Key : Analysis.DebugAnalysisProvider.CPP
Value: Create: 8007007e on DESKTOP-G25IS1E
Key : Analysis.DebugData
Value: CreateObject
Key : Analysis.DebugModel
Value: CreateObject
Key : Analysis.Elapsed.Sec
Value: 92
Key : Analysis.Memory.CommitPeak.Mb
Value: 78
Key : Analysis.System
Value: CreateObject
ADDITIONAL_XML: 1
BUGCHECK_CODE: 1e
BUGCHECK_P1: ffffffffc0000005
BUGCHECK_P2: fffff80161e8d2e1
BUGCHECK_P3: 0
BUGCHECK_P4: ffffffffffffffff
READ_ADDRESS: fffff803c146b358: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
fffff803c13c4ff0: Unable to get Flags value from nt!KdVersionBlock
ffffffffffffffff
EXCEPTION_PARAMETER2: ffffffffffffffff
BLACKBOXBSD: 1 (!blackboxbsd)
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: System
TRAP_FRAME: ffffc78300000001 -- (.trap 0xffffc78300000001)
Unable to read trap frame at ffffc783`00000001
STACK_TEXT:
fffff803`c2e59e18 fffff803`c12850f6 : 00000000`0000001e ffffffff`c0000005 fffff801`61e8d2e1 00000000`00000000 : nt!KeBugCheckEx
fffff803`c2e59e20 fffff803`c11fc8cd : fffff803`c1414000 fffff803`c108a000 000536f4`00889000 00000000`00000000 : nt!KiFatalExceptionHandler+0x22
fffff803`c2e59e60 fffff803`c10b5d94 : 00000000`00000000 fffff803`c2e59f90 00000000`00000000 00000000`00000006 : nt!RtlpExecuteHandlerForException+0xd
fffff803`c2e59e90 fffff803`c10b4b36 : fffff803`c2e5ad68 fffff803`c2e5aab0 fffff803`c2e5ad68 fffff803`c2e5ad68 : nt!RtlDispatchException+0x404
fffff803`c2e5a580 fffff803`c120188e : ffffc783`784b41a0 00000000`00000000 ffffc783`00000001 00000000`00000000 : nt!KiDispatchException+0x1f6
fffff803`c2e5ac30 fffff803`c11ffb34 : 00000000`00000000 00000000`00006efe 29671af8`00544208 159c614c`09dc2828 : nt!KiExceptionDispatch+0xce
fffff803`c2e5ae10 fffff801`61e8d2e1 : ffffc783`78c02c20 ffffc783`78c02ba8 ffffc783`79483000 00000000`00000002 : nt!KiGeneralProtectionFault+0xf4
fffff803`c2e5afa0 fffff801`61fab537 : ffffc783`789fba00 00000000`00000000 ffffc783`79483000 fffff803`c1409b80 : netr28ux!REPORT_ETHERNET_FRAME_TO_LLC+0x1a1
fffff803`c2e5b010 fffff801`61e9b749 : ffffc783`790c6018 ffffc783`790c6028 ffffc783`790c6000 ffffc783`790c6000 : netr28ux!QosBADataParse+0x75b
fffff803`c2e5b0b0 fffff801`61f99166 : ffffc783`78c00000 ffffc783`789fbe00 ffffc783`78630602 00000000`00000000 : netr28ux!RTUSBRxPacket+0x4371
fffff803`c2e5b270 fffff801`5ddb12fe : ffffc783`789fbe60 ffffc783`7809e810 ffffc783`78f31e68 00000000`00000000 : netr28ux!RTUSBBulkRxComplete+0x216
fffff803`c2e5b2e0 fffff801`5ddb0a90 : 00000000`00000000 00000000`00000001 ffffc783`789fbe60 00000000`00000000 : Wdf01000!FxRequestBase::CompleteSubmitted+0x60e [minkernel\wdf\framework\shared\core\fxrequestbase.cpp @ 523]
fffff803`c2e5b3a0 fffff803`c119c728 : ffffc783`784b4050 00000000`00000002 00000000`00000000 ffffc783`77ab72f8 : Wdf01000!FxIoTarget::_RequestCompletionRoutine+0xd0 [minkernel\wdf\framework\shared\targets\general\fxiotarget.cpp @ 2448]
fffff803`c2e5b410 fffff803`c10f6107 : ffffc783`789fbc50 fffff803`c2e5b540 00000000`00000000 ffffc783`789fbdfb : nt!IopUnloadSafeCompletion+0x58
fffff803`c2e5b440 fffff801`61b82ea3 : ffffc783`7657a680 ffffc783`77afc000 ffffc783`77afc1a0 ffffc783`00000000 : nt!IopfCompleteRequest+0x117
fffff803`c2e5b570 fffff801`61b80fbe : 00000000`00000002 ffffc783`7a2de57c ffffc783`77afd0e8 00000000`00000000 : USBPORT!USBPORT_Core_iCompleteDoneTransfer+0x873
fffff803`c2e5b910 fffff801`61b7dceb : ffffc783`7a2de6b4 ffffc783`77afd180 ffffc783`77afc1a0 fffff801`00000000 : USBPORT!USBPORT_Core_iIrpCsqCompleteDoneTransfer+0x21e
fffff803`c2e5b970 fffff801`61b7da54 : 00000000`00000000 ffffc783`77afc050 ffffc783`77aa5002 ffffc783`75f01010 : USBPORT!USBPORT_Core_UsbIocDpc_Worker+0x23b
fffff803`c2e5b9e0 fffff803`c10fcb6c : fffff803`c2e5bb60 00000000`00000000 fffff803`c02b0180 00000000`00000002 : USBPORT!USBPORT_Xdpc_Worker_IocDpc+0x204
fffff803`c2e5ba60 fffff803`c10fc477 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiExecuteAllDpcs+0x1dc
fffff803`c2e5bba0 fffff803`c11f949a : 00000000`00000000 fffff803`c02b0180 00000000`001a6fe0 fffff803`c1483a40 : nt!KiRetireDpcList+0xd7
fffff803`c2e5bda0 00000000`00000000 : fffff803`c2e5c000 fffff803`c2e56000 00000000`00000000 00000000`00000000 : nt!KiIdleLoop+0x5a
SYMBOL_NAME: netr28ux!REPORT_ETHERNET_FRAME_TO_LLC+1a1
MODULE_NAME: netr28ux
IMAGE_NAME: netr28ux.sys
IMAGE_VERSION: 5.1.22.0
STACK_COMMAND: .thread ; .cxr ; kb
BUCKET_ID_FUNC_OFFSET: 1a1
FAILURE_BUCKET_ID: 0x1E_c0000005_R_netr28ux!REPORT_ETHERNET_FRAME_TO_LLC
OS_VERSION: 10.0.15063.0
BUILDLAB_STR: rs2_release
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {f3faef62-8d45-c55c-68ce-97eaeb902110}
Followup: MachineOwner
---------
UNEXPECTED_STORE_EXCEPTION (154)
The store component caught an unexpected exception.
Arguments:
Arg1: ffff9e0e49608000, Pointer to the store context or data manager
Arg2: ffffe281af9bc9b0, Exception information
Arg3: 0000000000000001, Reserved
Arg4: 0000000000000000, Reserved
Debugging Details:
------------------
*** WARNING: Unable to verify timestamp for win32k.sys
KEY_VALUES_STRING: 1
Key : Analysis.CPU.Sec
Value: 2
Key : Analysis.DebugAnalysisProvider.CPP
Value: Create: 8007007e on DESKTOP-G25IS1E
Key : Analysis.DebugData
Value: CreateObject
Key : Analysis.DebugModel
Value: CreateObject
Key : Analysis.Elapsed.Sec
Value: 19
Key : Analysis.Memory.CommitPeak.Mb
Value: 66
Key : Analysis.System
Value: CreateObject
ADDITIONAL_XML: 1
BUGCHECK_CODE: 154
BUGCHECK_P1: ffff9e0e49608000
BUGCHECK_P2: ffffe281af9bc9b0
BUGCHECK_P3: 1
BUGCHECK_P4: 0
EXCEPTION_RECORD: ffffe281af9bd8f8 -- (.exr 0xffffe281af9bd8f8)
ExceptionAddress: fffff80bf495c47e (rdyboost!memset+0x00000000000060be)
ExceptionCode: c0000420 (Assertion failure)
ExceptionFlags: 00000000
NumberParameters: 0
EXCEPTION_PARAMETER1: ffff9e0e49c9bec8
EXCEPTION_PARAMETER2: 0000000000005eeb
CONTEXT: ffffe281af9bd140 -- (.cxr 0xffffe281af9bd140)
rax=00000000c0000225 rbx=ffff9e0e49608050 rcx=00000000f36f0a12
rdx=ffff9e0e49fd1070 rsi=0000000000015007 rdi=ffff9e0e496080e8
rip=fffff80bf495c47e rsp=ffffe281af9bdb30 rbp=0000000000000000
r8=000000004dc9551f r9=ffff9e0e49c9bec8 r10=0000000000005eeb
r11=ffff9e0e49d51000 r12=ffff9e0e49608068 r13=ffff9e0e49fcf000
r14=ffff9e0e49fd1088 r15=ffff9e0e49fd1088
iopl=0 nv up ei ng nz na pe nc
cs=0010 ss=0018 ds=002b es=002b fs=0053 gs=002b efl=00000282
rdyboost!memset+0x60be:
fffff80b`f495c47e cd2c int 2Ch
Resetting default scope
BLACKBOXBSD: 1 (!blackboxbsd)
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: System
ERROR_CODE: (NTSTATUS) 0xc0000420 - Onaylama hatas olu tu.
EXCEPTION_CODE_STR: c0000420
EXCEPTION_STR: 0xc0000420
STACK_TEXT:
ffffe281`af9bdb30 fffff80b`f4950968 : ffff9e0e`49fd1088 00000000`0405ea4e ffffe281`af9bdbe9 00000000`00000000 : rdyboost!memset+0x60be
ffffe281`af9bdb70 fffff80b`f494fc99 : ffff9e0e`49608000 fffff80b`f494dca1 00000000`00000000 00000000`00000002 : rdyboost!ST_STORE<SMD_TRAITS>::StDmPageRemove+0x368
ffffe281`af9bdc50 fffff80b`f494db11 : ffffe281`af1bb048 00000000`00000001 ffff9e0e`49608000 ffffe281`af1bb048 : rdyboost!ST_STORE<SMD_TRAITS>::StWorkItemProcess+0x119
ffffe281`af9bdca0 fffff80b`f49556d1 : ec8b55ff`00000000 458d00fc`00000000 00000000`00000001 ffffe281`af20f000 : rdyboost!SMKM_STORE<SMD_TRAITS>::SmStWorker+0x141
ffffe281`af9bdd20 fffff801`e1cdda37 : ffff9e0e`49608000 fffff801`e1d727f7 00000000`0038373d ffff9e0e`49652040 : rdyboost!SMKM_STORE<SMD_TRAITS>::SmStWorkerThread+0x11
ffffe281`af9bdd50 fffff801`e1d72876 : ffffe281`af200180 ffff9e0e`49652040 fffff801`e1cdd9f0 ce8bec75`8b3c478b : nt!PspSystemThreadStartup+0x47
ffffe281`af9bdda0 00000000`00000000 : ffffe281`af9be000 ffffe281`af9b8000 00000000`00000000 00000000`00000000 : nt!KiStartSystemThread+0x16
SYMBOL_NAME: rdyboost!memset+60be
MODULE_NAME: rdyboost
IMAGE_NAME: rdyboost.sys
IMAGE_VERSION: 10.0.15063.413
STACK_COMMAND: .cxr 0xffffe281af9bd140 ; kb
BUCKET_ID_FUNC_OFFSET: 60be
FAILURE_BUCKET_ID: 0x154_c0000420_rdyboost!memset
OS_VERSION: 10.0.15063.0
BUILDLAB_STR: rs2_release
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {d8ceb239-bf51-bb45-d0e8-3face644ed01}
Followup: MachineOwner
---------
UNEXPECTED_KERNEL_MODE_TRAP (7f)
This means a trap occurred in kernel mode, and it's a trap of a kind
that the kernel isn't allowed to have/catch (bound trap) or that
is always instant death (double fault). The first number in the
bugcheck params is the number of the trap (8 = double fault, etc)
Consult an Intel x86 family manual to learn more about what these
traps are. Here is a *portion* of those codes:
If kv shows a taskGate
use .tss on the part before the colon, then kv.
Else if kv shows a trapframe
use .trap on that value
Else
.trap on the appropriate frame will show where the trap was taken
(on x86, this will be the ebp that goes with the procedure KiTrap)
Endif
kb will then show the corrected stack.
Arguments:
Arg1: 0000000000000008, EXCEPTION_DOUBLE_FAULT
Arg2: fffff80061e6be70
Arg3: fffff80061e52000
Arg4: fffff807226738c4
Debugging Details:
------------------
KEY_VALUES_STRING: 1
Key : Analysis.CPU.Sec
Value: 2
Key : Analysis.DebugAnalysisProvider.CPP
Value: Create: 8007007e on DESKTOP-G25IS1E
Key : Analysis.DebugData
Value: CreateObject
Key : Analysis.DebugModel
Value: CreateObject
Key : Analysis.Elapsed.Sec
Value: 10
Key : Analysis.Memory.CommitPeak.Mb
Value: 67
Key : Analysis.System
Value: CreateObject
ADDITIONAL_XML: 1
BUGCHECK_CODE: 7f
BUGCHECK_P1: 8
BUGCHECK_P2: fffff80061e6be70
BUGCHECK_P3: fffff80061e52000
BUGCHECK_P4: fffff807226738c4
TRAP_FRAME: fffff80061e6be70 -- (.trap 0xfffff80061e6be70)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000000 rbx=0000000000000000 rcx=fffff807226710f0
rdx=000000dd8daff368 rsi=0000000000000000 rdi=0000000000000000
rip=fffff807226738c4 rsp=fffff80061e52000 rbp=ffffca8136dfcef0
r8=00000000d5a0b346 r9=242766f57ccb4a4f r10=00000000000024fe
r11=0000000000004a4f r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei pl zr na po nc
clipsp+0x38c4:
fffff807`226738c4 51 push rcx
Resetting default scope
BLACKBOXBSD: 1 (!blackboxbsd)
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: SearchUI.exe
BAD_STACK_POINTER: fffff80061e52000
STACK_TEXT:
fffff800`61e6bd28 fffff800`6018d7a9 : 00000000`0000007f 00000000`00000008 fffff800`61e6be70 fffff800`61e52000 : nt!KeBugCheckEx
fffff800`61e6bd30 fffff800`6018b5f3 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiBugCheckDispatch+0x69
fffff800`61e6be70 fffff807`226738c4 : 36dfedd0`00000000 00000000`ffffca81 00000000`00000000 00000000`00000000 : nt!KiDoubleFaultAbort+0xb3
fffff800`61e52000 36dfedd0`00000000 : 00000000`ffffca81 00000000`00000000 00000000`00000000 61e6c000`00000000 : clipsp+0x38c4
fffff800`61e52008 00000000`ffffca81 : 00000000`00000000 00000000`00000000 61e6c000`00000000 61e70000`fffff800 : 0x36dfedd0`00000000
fffff800`61e52010 00000000`00000000 : 00000000`00000000 61e6c000`00000000 61e70000`fffff800 61e6e000`fffff800 : 0xffffca81
SYMBOL_NAME: clipsp+38c4
MODULE_NAME: clipsp
IMAGE_NAME: clipsp.sys
IMAGE_VERSION: 10.0.15063.0
STACK_COMMAND: .thread ; .cxr ; kb
BUCKET_ID_FUNC_OFFSET: 38c4
FAILURE_BUCKET_ID: 0x7f_8_STACKPTR_ERROR_clipsp!unknown_function
OS_VERSION: 10.0.15063.0
BUILDLAB_STR: rs2_release
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {48f2dfdf-6e28-ad4e-f693-f41bb475ff86}
Followup: MachineOwner
---------