*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
PAGE_FAULT_IN_NONPAGED_AREA (50)
Invalid system memory was referenced. This cannot be protected by try-except.
Typically the address is just plain bad or it is pointing at freed memory.
Arguments:
Arg1: ffffa28cef962000, memory referenced.
Arg2: 0000000000000011, X64: bit 0 set if the fault was due to a not-present PTE.
bit 1 is set if the fault was due to a write, clear if a read.
bit 3 is set if the processor decided the fault was due to a corrupted PTE.
bit 4 is set if the fault was due to attempted execute of a no-execute PTE.
- ARM64: bit 1 is set if the fault was due to a write, clear if a read.
bit 3 is set if the fault was due to attempted execute of a no-execute PTE.
Arg3: fffff80750434794, If non-zero, the instruction address which referenced the bad memory
address.
Arg4: 0000000000000002, (reserved)
Debugging Details:
------------------
KEY_VALUES_STRING: 1
Key : AV.PTE
Value: Valid
Key : AV.Type
Value: Execute
Key : Analysis.CPU.mSec
Value: 3000
Key : Analysis.DebugAnalysisManager
Value: Create
Key : Analysis.Elapsed.mSec
Value: 20244
Key : Analysis.Init.CPU.mSec
Value: 468
Key : Analysis.Init.Elapsed.mSec
Value: 56659
Key : Analysis.Memory.CommitPeak.Mb
Value: 87
Key : Bugcheck.Code.DumpHeader
Value: 0x50
Key : Bugcheck.Code.Register
Value: 0x50
Key : WER.OS.Branch
Value: co_release
Key : WER.OS.Timestamp
Value: 2021-06-04T16:28:00Z
Key : WER.OS.Version
Value: 10.0.22000.1
FILE_IN_CAB: 081422-9562-01.dmp
BUGCHECK_CODE: 50
BUGCHECK_P1: ffffa28cef962000
BUGCHECK_P2: 11
BUGCHECK_P3: fffff80750434794
BUGCHECK_P4: 2
WRITE_ADDRESS: fffff80750f05450: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
unable to get nt!MmSpecialPagesInUse
ffffa28cef962000
MM_INTERNAL_CODE: 2
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXPNP: 1 (!blackboxpnp)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: opera.exe
TRAP_FRAME: ffffa28cef9625e0 -- (.trap 0xffffa28cef9625e0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=ffffb70979a5c150 rbx=0000000000000000 rcx=0000000000084a00
rdx=0000000000080000 rsi=0000000000000000 rdi=0000000000000000
rip=fffff80750434794 rsp=ffffa28cef962770 rbp=0000000000000000
r8=0000000000000004 r9=ffffb70979a5c230 r10=fffff80750e530b0
r11=00007ffffffeffff r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei ng nz na po nc
nt!MiAllocateInPageSupport+0x54:
fffff807`50434794 4885c0 test rax,rax
Resetting default scope
STACK_TEXT:
ffffa28c`ef962338 fffff807`506978d3 : 00000000`00000050 ffffa28c`ef962000 00000000`00000011 ffffa28c`ef9625e0 : nt!KeBugCheckEx
ffffa28c`ef962340 fffff807`50475cf6 : 00000000`00000010 00000000`00000011 ffffa28c`ef962540 00000000`00000000 : nt!MiSystemFault+0x1d3613
ffffa28c`ef962440 fffff807`506269f5 : fffff807`50e54e40 00000000`00000000 00000000`00000004 fffff807`504547e5 : nt!MmAccessFault+0x2a6
ffffa28c`ef9625e0 fffff807`50434794 : 00003dc8`08c97000 00000000`00000000 00000004`00000004 ffffa28c`ef9627c8 : nt!KiPageFault+0x335
ffffa28c`ef962770 00000000`00000000 : 00000000`00000000 00003dc8`02e79000 00000004`00000000 00000000`00000000 : nt!MiAllocateInPageSupport+0x54
SYMBOL_NAME: nt!MiAllocateInPageSupport+54
MODULE_NAME: nt
IMAGE_VERSION: 10.0.22000.856
STACK_COMMAND: .cxr; .ecxr ; kb
IMAGE_NAME: ntkrnlmp.exe
BUCKET_ID_FUNC_OFFSET: 54
FAILURE_BUCKET_ID: AV_X_(null)_nt!MiAllocateInPageSupport
OS_VERSION: 10.0.22000.1
BUILDLAB_STR: co_release
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {13049bab-d47b-fab1-cdf6-7416c4b3b646}
Followup: MachineOwner
---------
PnpActivityId : {00000000-0000-0000-0000-000000000000}
PnpActivityTime : 133049641759321208
PnpEventInformation: 3
PnpEventInProgress : 0
PnpProblemCode : 24
PnpVetoType : 0
DeviceId : STORAGE\Volume\{a44b3798-154f-11ed-9906-d8f3bc94b6e0}#0000000E9F300000
VetoString :