*** WARNING: Unable to verify checksum for win32k.sys
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 3624
Key : Analysis.DebugAnalysisManager
Value: Create
Key : Analysis.Elapsed.mSec
Value: 15430
Key : Analysis.Init.CPU.mSec
Value: 327
Key : Analysis.Init.Elapsed.mSec
Value: 5050
Key : Analysis.Memory.CommitPeak.Mb
Value: 81
Key : WER.OS.Branch
Value: vb_release
Key : WER.OS.Timestamp
Value: 2019-12-06T14:06:00Z
Key : WER.OS.Version
Value: 10.0.19041.1
BUGCHECK_CODE: 139
BUGCHECK_P1: 0
BUGCHECK_P2: 0
BUGCHECK_P3: 0
BUGCHECK_P4: fffff80353487920
TRAP_FRAME: 0000000000000000 -- (.trap 0x0)
EXCEPTION_RECORD: 0000000000000000 -- (.exr 0x0)
Cannot read Exception record @ 0000000000000000
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXPNP: 1 (!blackboxpnp)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: System
STACK_TEXT:
fffff803`53487168 fffff803`4f1ffd0b : 00000000`00000139 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KeBugCheckEx
fffff803`53487170 fffff803`4f20008f : fffff803`4f1ffcf0 00000000`00000000 00000000`00000000 00000000`00000000 : nt!guard_icall_handler+0x1b
fffff803`534871a0 fffff803`4f0e6dd7 : fffff803`53487710 00000000`00000000 fffff803`53487920 fffff803`4f1ffde1 : nt!RtlpExecuteHandlerForException+0xf
fffff803`534871d0 fffff803`4f0e59c6 : fffff803`534713a8 fffff803`53487e20 fffff803`534713a8 00000000`00000000 : nt!RtlDispatchException+0x297
fffff803`534878f0 fffff803`4f1f8062 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiDispatchException+0x186
fffff803`53487fb0 fffff803`4f1f8030 : fffff803`4f2092a5 00000000`0000000d fffff803`53471278 fffff803`53471278 : nt!KxExceptionDispatchOnExceptionStack+0x12
fffff803`53471268 fffff803`4f2092a5 : 00000000`0000000d fffff803`53471278 fffff803`53471278 fffff803`4ee00001 : nt!KiExceptionDispatchOnExceptionStackContinue
fffff803`53471270 fffff803`4f204fe0 : ffffd981`aebe8180 fffff803`4f08854f 00000000`00000000 ffffc78a`fbf79040 : nt!KiExceptionDispatch+0x125
fffff803`53471450 fffff803`4f1ffde1 : fffff803`4f018c3b ffffc78a`ff436318 00000000`00000000 ffffc78a`ff436000 : nt!KiGeneralProtectionFault+0x320
fffff803`534715e8 fffff803`4f018c3b : ffffc78a`ff436318 00000000`00000000 ffffc78a`ff436000 ffffc78a`ff436000 : nt!guard_dispatch_icall+0x71
fffff803`534715f0 fffff803`4f017274 : 00000000`00000000 00001f80`00000000 00000000`00000003 00000000`00000002 : nt!PpmIdleExecuteTransition+0x184b
fffff803`534719f0 fffff803`4f1facf4 : 00000000`00000000 fffff803`4fb26a00 ffffc78b`0a0c9040 00000000`00018a54 : nt!PoIdle+0x374
fffff803`53471b60 00000000`00000000 : fffff803`53472000 fffff803`5346b000 00000000`00000000 00000000`00000000 : nt!KiIdleLoop+0x54
SYMBOL_NAME: nt!guard_icall_handler+1b
MODULE_NAME: nt
IMAGE_NAME: ntkrnlmp.exe
IMAGE_VERSION: 10.0.19041.1165
STACK_COMMAND: .thread ; .cxr ; kb
BUCKET_ID_FUNC_OFFSET: 1b
FAILURE_BUCKET_ID: 0x139_0_LEGACY_GS_VIOLATION_nt!guard_icall_handler
OS_VERSION: 10.0.19041.1
BUILDLAB_STR: vb_release
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {9ac18088-8c91-40fd-01fb-5255bc467cba}
Followup: MachineOwner
NatVis script unloaded from 'C:\Program Files\WindowsApps\Microsoft.WinDbg_1.2107.13001.0_neutral_8wekyb3d8bbwe\amd64\Visualizers\atlmfc.natvis'
NatVis script unloaded from 'C:\Program Files\WindowsApps\Microsoft.WinDbg_1.2107.13001.0_neutral8wekyb3d8bbwe\amd64\Visualizers\ObjectiveC.natvis'
NatVis script unloaded from 'C:\Program Files\WindowsApps\Microsoft.WinDbg_1.2107.13001.0_neutral8wekyb3d8bbwe\amd64\Visualizers\concurrency.natvis'
NatVis script unloaded from 'C:\Program Files\WindowsApps\Microsoft.WinDbg_1.2107.13001.0_neutral8wekyb3d8bbwe\amd64\Visualizers\cpp_rest.natvis'
NatVis script unloaded from 'C:\Program Files\WindowsApps\Microsoft.WinDbg_1.2107.13001.0_neutral8wekyb3d8bbwe\amd64\Visualizers\Kernel.natvis'
NatVis script unloaded from 'C:\Program Files\WindowsApps\Microsoft.WinDbg_1.2107.13001.0_neutral8wekyb3d8bbwe\amd64\Visualizers\stl.natvis'
NatVis script unloaded from 'C:\Program Files\WindowsApps\Microsoft.WinDbg_1.2107.13001.0_neutral8wekyb3d8bbwe\amd64\Visualizers\Windows.Data.Json.natvis'
NatVis script unloaded from 'C:\Program Files\WindowsApps\Microsoft.WinDbg_1.2107.13001.0_neutral8wekyb3d8bbwe\amd64\Visualizers\Windows.Devices.Geolocation.natvis'
NatVis script unloaded from 'C:\Program Files\WindowsApps\Microsoft.WinDbg_1.2107.13001.0_neutral8wekyb3d8bbwe\amd64\Visualizers\Windows.Devices.Sensors.natvis'
NatVis script unloaded from 'C:\Program Files\WindowsApps\Microsoft.WinDbg_1.2107.13001.0_neutral8wekyb3d8bbwe\amd64\Visualizers\Windows.Media.natvis'
NatVis script unloaded from 'C:\Program Files\WindowsApps\Microsoft.WinDbg_1.2107.13001.0_neutral8wekyb3d8bbwe\amd64\Visualizers\windows.natvis'
NatVis script unloaded from 'C:\Program Files\WindowsApps\Microsoft.WinDbg_1.2107.13001.0_neutral_8wekyb3d8bbwe\amd64\Visualizers\winrt.natvis'
Microsoft (R) Windows Debugger Version 10.0.22415.1002 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [C:\Windows\Minidump\082521-4609-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
Path validation summary
Response Time (ms) Location
Deferred srv
Symbol search path is: srv*
Executable search path is:
Windows 10 Kernel Version 19041 MP (4 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS
Edition build lab: 19041.1.amd64fre.vb_release.191206-1406
Machine Name:
Kernel base = 0xfffff801`1d800000 PsLoadedModuleList = 0xfffff801`1e42a190
Debug session time: Wed Aug 25 23:50:48.127 2021 (UTC + 8:00)
System Uptime: 0 days 0:09:01.787
Loading Kernel Symbols
...............................................................
................................................................
..................................................
Loading User Symbols
Loading unloaded module list
......
For analysis of this file, run !analyze -v
nt!KeBugCheckEx:
fffff801`1dbf71d0 48894c2408 mov qword ptr [rsp+8],rcx ss:0018:ffffe784`9d36ee30=0000000000000050
1: kd> !analyze -v
Bugcheck Analysis *
PAGE_FAULT_IN_NONPAGED_AREA (50)
Invalid system memory was referenced. This cannot be protected by try-except.
Typically the address is just plain bad or it is pointing at freed memory.
Arguments:
Arg1: ffff92a81e9e6bf0, memory referenced.
Arg2: 0000000000000010, value 0 = read operation, 1 = write operation.
Arg3: ffff92a81e9e6bf0, If non-zero, the instruction address which referenced the bad memory
address.
Arg4: 0000000000000002, (reserved)
Debugging Details:
KEY_VALUES_STRING: 1
Key : AV.Type
Value: Execute
Key : Analysis.CPU.mSec
Value: 3468
Key : Analysis.DebugAnalysisManager
Value: Create
Key : Analysis.Elapsed.mSec
Value: 9181
Key : Analysis.Init.CPU.mSec
Value: 453
Key : Analysis.Init.Elapsed.mSec
Value: 5399
Key : Analysis.Memory.CommitPeak.Mb
Value: 85
Key : WER.OS.Branch
Value: vb_release
Key : WER.OS.Timestamp
Value: 2019-12-06T14:06:00Z
Key : WER.OS.Version
Value: 10.0.19041.1
BUGCHECK_CODE: 50
BUGCHECK_P1: ffff92a81e9e6bf0
BUGCHECK_P2: 10
BUGCHECK_P3: ffff92a81e9e6bf0
BUGCHECK_P4: 2
READ_ADDRESS: fffff8011e4fa390: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
unable to get nt!MmSpecialPagesInUse
ffff92a81e9e6bf0
MM_INTERNAL_CODE: 2
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: dwm.exe
TRAP_FRAME: ffffe7849d36f0d0 -- (.trap 0xffffe7849d36f0d0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=ffffe7849d36f2b0 rbx=0000000000000000 rcx=ffffc1813c5e0180
rdx=0000000000000000 rsi=0000000000000000 rdi=0000000000000000
rip=ffff92a81e9e6bf0 rsp=ffffe7849d36f268 rbp=ffff92a7fe8110a0
r8=ffff980f42a48490 r9=0000000000000000 r10=0000000000000000
r11=ffffe7849d36f1a0 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei ng nz na po nc
ffff92a8`1e9e6bf0 ?? ???
Resetting default scope
FAILED_INSTRUCTION_ADDRESS:
+0
ffff92a8`1e9e6bf0 ?? ???
STACK_TEXT:
ffffe784`9d36ee28 fffff801`1dc4a4a9 : 00000000`00000050 ffff92a8`1e9e6bf0 00000000`00000010 ffffe784`9d36f0d0 : nt!KeBugCheckEx
ffffe784`9d36ee30 fffff801`1da9f4f0 : 00000000`00000000 00000000`00000010 ffffe784`9d36f150 00000000`00000000 : nt!MiSystemFault+0x18d109
ffffe784`9d36ef30 fffff801`1dc0535e : ffff92a7`fe8460c0 ffff92a7`fe9659d0 ffffe784`9d36f3f8 00000000`00000000 : nt!MmAccessFault+0x400
ffffe784`9d36f0d0 ffff92a8`1e9e6bf0 : ffff92a7`fe96e3c8 ffff92a7`fe855748 ffffe784`9d36f570 00000000`00000000 : nt!KiPageFault+0x35e
ffffe784`9d36f268 ffff92a7`fe96e3c8 : ffff92a7`fe855748 ffffe784`9d36f570 00000000`00000000 ffff92a7`fe61b7c1 : 0xffff92a8`1e9e6bf0
ffffe784`9d36f270 ffff92a7`fe9f5469 : ffff92a7`fe855748 ffff92a7`fe855748 ffffe784`9d36f6f8 ffff92a7`fe8460c0 : win32kfull!zzzEndDeferWinEventNotify+0xac
ffffe784`9d36f2b0 ffff92a7`fe69e83d : 00000000`00000000 00000000`00000200 00000000`00000006 ffff92a7`fe8460c0 : win32kfull!EditionEndDeferWinEventNotify+0x9
ffffe784`9d36f2e0 ffff92a7`fe61b889 : ffffe784`9d36f410 ffffe784`9d36f3f0 ffffe784`9d36f570 ffff92c4`8067f000 : win32kbase!ApiSetEditionEndDeferWinEventNotify+0x61
ffffe784`9d36f320 ffff92a7`fe61f512 : ffffe784`9d36f570 ffffe784`9d36f470 00000000`00000012 00000000`00000000 : win32kbase!CMouseProcessor::DeliverMouseMoveToInputDest+0x81
ffffe784`9d36f370 ffff92a7`fe61d88e : ffffe784`9d36f620 ffffe784`9d36f6a0 ffffe784`9d36f620 fffff801`00000000 : win32kbase!CMouseProcessor::ProcessMouseMove+0x1de
ffffe784`9d36f540 ffff92a7`fe61e3b9 : ffff92a7`fe8036d8 ffff92a7`fe855720 ffffe784`00000003 ffff980f`435151b0 : win32kbase!CMouseProcessor::ComputeAndDeliverMouseMove+0x6e
ffffe784`9d36f5a0 ffff92a7`fe61d586 : 00000000`00000001 00000000`00000000 ffff92a7`fe8460c0 00000000`00000000 : win32kbase!CMouseProcessor::ProcessMouseEvent+0x365
ffffe784`9d36f810 ffff92a7`fe9b3d37 : 00000000`00000002 ffffffff`80000450 ffff92a7`fe8460c0 00000000`00000000 : win32kbase!ProcessMouseEvent+0x16
ffffe784`9d36f840 ffff92a7`fe61d431 : ffffe784`9d36f8a0 00000000`00000000 00000000`00000002 ffffe784`00000000 : win32kfull!EditionHandleMitSignal+0x57
ffffe784`9d36f880 ffff92a7`fe61d3a2 : ffff92c4`82875a20 ffff92c4`82875010 00000000`00000000 00000000`00000000 : win32kbase!ApiSetEditionHandleMitSignal+0x6d
ffffe784`9d36f8c0 ffff92a7`fe627a4f : 00000000`00000000 00000000`00000000 ffff92a7`fe8460c0 00000000`00000000 : win32kbase!IOCPDispatcher::HandleThreadDispatcherSignal+0x66
ffffe784`9d36f900 ffff92a7`fe6279f1 : 00000000`00000000 000001e3`00000000 ffff92c4`80613da0 00000010`079ff1f8 : win32kbase!IOCPDispatcher::Dispatch+0x1f
ffffe784`9d36f960 ffff92a7`fe627975 : 00000000`000005b0 ffff92c4`80613da0 00000000`000005b0 00000000`00000000 : win32kbase!UserDispatchMITCompletion+0x55
ffffe784`9d36f9a0 ffff92a7`ff43f8aa : ffff980f`434ea080 ffffe784`9d36fa80 000001e3`4ec20fa0 00000000`00000020 : win32kbase!NtMITDispatchCompletion+0x85
ffffe784`9d36f9d0 fffff801`1dc08bb5 : ffff980f`434ea080 00000000`00000000 ffffe784`00000000 ffff980f`00000000 : win32k!NtMITDispatchCompletion+0x16
ffffe784`9d36fa00 00007ffd`647076e4 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x25
00000010`079ff2a8 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffd`647076e4
SYMBOL_NAME: win32kfull!zzzEndDeferWinEventNotify+ac
MODULE_NAME: win32kfull
IMAGE_NAME: win32kfull.sys
IMAGE_VERSION: 10.0.19041.1165
STACK_COMMAND: .thread ; .cxr ; kb
BUCKET_ID_FUNC_OFFSET: ac
FAILURE_BUCKET_ID: AV_X_(null)_BAD_IP_win32kfull!zzzEndDeferWinEventNotify
OS_VERSION: 10.0.19041.1
BUILDLAB_STR: vb_release
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {8d4cd1a3-9715-d51a-8e26-9010c36445e6}