Spoiler PAGE_FAULT_IN_NONPAGED_AREA (50)
Invalid system memory was referenced. This cannot be protected by try-except.
Typically the address is just plain bad or it is pointing at freed memory.
Arguments:
Arg1: ffff908401cae250, memory referenced.
Arg2: 0000000000000000, X64: bit 0 set if the fault was due to a not-present PTE.
bit 1 is set if the fault was due to a write, clear if a read.
bit 3 is set if the processor decided the fault was due to a corrupted PTE.
bit 4 is set if the fault was due to attempted execute of a no-execute PTE.
- ARM64: bit 1 is set if the fault was due to a write, clear if a read.
bit 3 is set if the fault was due to attempted execute of a no-execute PTE.
Arg3: fffff80703bd2eb1, If non-zero, the instruction address which referenced the bad memory
address.
Arg4: 0000000000000002, (reserved)
Debugging Details:
------------------
KEY_VALUES_STRING: 1
Key : AV.Type
Value: Read
Key : Analysis.CPU.mSec
Value: 5015
Key : Analysis.DebugAnalysisManager
Value: Create
Key : Analysis.Elapsed.mSec
Value: 7552
Key : Analysis.IO.Other.Mb
Value: 0
Key : Analysis.IO.Read.Mb
Value: 2
Key : Analysis.IO.Write.Mb
Value: 0
Key : Analysis.Init.CPU.mSec
Value: 358
Key : Analysis.Init.Elapsed.mSec
Value: 2583
Key : Analysis.Memory.CommitPeak.Mb
Value: 140
Key : Bugcheck.Code.DumpHeader
Value: 0x50
Key : Bugcheck.Code.Register
Value: 0x50
Key : WER.OS.Branch
Value: vb_release
Key : WER.OS.Timestamp
Value: 2019-12-06T14:06:00Z
Key : WER.OS.Version
Value: 10.0.19041.1
FILE_IN_CAB: 011723-13812-01.dmp
BUGCHECK_CODE: 50
BUGCHECK_P1: ffff908401cae250
BUGCHECK_P2: 0
BUGCHECK_P3: fffff80703bd2eb1
BUGCHECK_P4: 2
READ_ADDRESS: fffff807044fb390: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
unable to get nt!MmSpecialPagesInUse
ffff908401cae250
MM_INTERNAL_CODE: 2
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXPNP: 1 (!blackboxpnp)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: svchost.exe
TRAP_FRAME: ffff830d0b45e8b0 -- (.trap 0xffff830d0b45e8b0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=000000000000006d rbx=0000000000000000 rcx=ffffb40d5caf7040
rdx=ffff908401cae250 rsi=0000000000000000 rdi=0000000000000000
rip=fffff80703bd2eb1 rsp=ffff830d0b45ea48 rbp=0000000000000000
r8=000000000000007f r9=0000000000000000 r10=fffff80703bd2ea0
r11=ffff830d0b45eac0 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei pl nz na pe nc
nt!wcsncmp+0x11:
fffff807`03bd2eb1 663b02 cmp ax,word ptr [rdx] ds:ffff9084`01cae250=????
Resetting default scope
STACK_TEXT:
ffff830d`0b45e608 fffff807`03c36e57 : 00000000`00000050 ffff9084`01cae250 00000000`00000000 ffff830d`0b45e8b0 : nt!KeBugCheckEx
ffff830d`0b45e610 fffff807`03a42250 : ffffb40d`00000005 00000000`00000000 ffff830d`0b45e930 00000000`00000000 : nt!MiSystemFault+0x1d6bd7
ffff830d`0b45e710 fffff807`03c09cd8 : 00000000`00000080 ffffb40d`4a002290 00000000`00000037 00000000`00000350 : nt!MmAccessFault+0x400
ffff830d`0b45e8b0 fffff807`03bd2eb1 : fffff807`08df362c 00000000`00000000 00000000`00000001 00000000`00000001 : nt!KiPageFault+0x358
ffff830d`0b45ea48 fffff807`08df362c : 00000000`00000000 00000000`00000001 00000000`00000001 00000000`41636450 : nt!wcsncmp+0x11
ffff830d`0b45ea50 fffff807`08df3b71 : ffff9084`8b775bb0 ffffb40d`5caf7140 ffffb40d`5caf7040 ffffc511`76636bc4 : pdc!PdcpGetActivationStatsByTask+0x50
ffff830d`0b45eaa0 fffff807`08de5d18 : ffffb40d`52f07720 ffffb40d`5caf7010 00000000`00000003 00000000`00000008 : pdc!PdcReferenceActivationStats+0xa5
ffff830d`0b45ead0 fffff807`08de6d72 : 00000000`c0000001 00000000`00000000 ffffb40d`52f07720 fffff807`03af7906 : pdc!PdcpReferenceActivationInstance+0x98
ffff830d`0b45eb40 fffff807`08dd1619 : ffff830d`0b45f160 ffff830d`0b45ed10 ffff9084`88b4f5c0 ffff830d`0b45f0c8 : pdc!PdcpV2Activation+0x1ce
ffff830d`0b45ebb0 fffff807`08de933b : ffff830d`00000000 00000062`5f800a01 ffff830d`0b45ed10 00000062`5f800a01 : pdc!PdcV2ActivatorReceive+0x11
ffff830d`0b45ebe0 fffff807`08de8d5f : ffff830d`0b45f160 ffff830d`0b45ed10 ffff9084`88b4f5c0 00000000`00000000 : pdc!PdcProcessReceivedUserMessage+0x4b
ffff830d`0b45ec10 fffff807`08de87f2 : 00000000`000000a0 ffff830d`0b45f160 00000000`000000a0 00000000`00000000 : pdc!PdcProcessMessage+0x4b3
ffff830d`0b45f060 fffff807`08de8619 : ffffb40d`4bc822a0 ffff9084`82a01e00 ffff9084`82a04480 ffffb40d`00000110 : pdc!PdcpAlpcProcessMessages+0x6a
ffff830d`0b45f4a0 fffff807`03b2278f : ffffb40d`4bc842c0 ffff9084`88a3f8b0 00000000`000002e0 fffff807`00000000 : pdc!PdcMessageCallback+0x9
ffff830d`0b45f4d0 fffff807`03b226bc : ffff9084`88a3f8b0 ffffb40d`4bbb4cb0 ffffb40d`4bc842c0 ffffb40d`4bbb4cb0 : nt!ExNotifyWithProcessing+0xc7
ffff830d`0b45f530 fffff807`03e2adec : ffffffff`00000002 ffffffff`00000000 ffffb40d`4bc842c0 ffff9084`95b69c70 : nt!ExNotifyCallback+0xc
ffff830d`0b45f560 fffff807`03e2a4a4 : ffffb40d`00000000 00000000`00000000 ffff9084`95b69c70 fffff807`03ed440f : nt!AlpcpCompleteDispatchMessage+0x8bc
ffff830d`0b45f610 fffff807`03e2a17f : 00000000`00020000 00000076`39a7d960 00000000`00000000 00000000`00000000 : nt!AlpcpDispatchNewMessage+0x2d4
ffff830d`0b45f670 fffff807`03e2c1dc : ffff830d`0b45f830 00000076`39a7d960 00000000`00000000 ffffb40d`57d09001 : nt!AlpcpSendMessage+0x9ff
ffff830d`0b45f7b0 fffff807`03e2cbe6 : ffffb40d`55129df0 00000000`00020000 00000076`39a7d960 00000000`00000000 : nt!AlpcpProcessSynchronousRequest+0x31c
ffff830d`0b45f8d0 fffff807`03c0d9f5 : ffffb40d`57d09080 ffff830d`0b45fa80 00000076`39a7d878 ffff830d`0b45f9a8 : nt!NtAlpcSendWaitReceivePort+0x1d6
ffff830d`0b45f990 00007ffd`8c64e234 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x25
00000076`39a7d858 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffd`8c64e234
SYMBOL_NAME: pdc!PdcpGetActivationStatsByTask+50
MODULE_NAME: pdc
IMAGE_NAME: pdc.sys
IMAGE_VERSION: 10.0.19041.1052
STACK_COMMAND: .cxr; .ecxr ; kb
BUCKET_ID_FUNC_OFFSET: 50
FAILURE_BUCKET_ID: AV_R_(null)_pdc!PdcpGetActivationStatsByTask
OS_VERSION: 10.0.19041.1
BUILDLAB_STR: vb_release
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {4a3012ad-fbed-e911-5d10-6b73333e9486}
Followup: MachineOwner
---------