PAGE_FAULT_IN_NONPAGED_AREA (50)
Invalid system memory was referenced. This cannot be protected by try-except.
Typically the address is just plain bad or it is pointing at freed memory.
Arguments:
Arg1: ffffca800fb80e3e, memory referenced.
Arg2: 0000000000000000, value 0 = read operation, 1 = write operation.
Arg3: fffff8061d86ba8d, If non-zero, the instruction address which referenced the bad memory
address.
Arg4: 0000000000000000, (reserved)
Debugging Details:
------------------
*** WARNING: Unable to verify timestamp for vgk.sys
KEY_VALUES_STRING: 1
Key : AV.Type
Value: Read
Key : Analysis.CPU.mSec
Value: 2952
Key : Analysis.DebugAnalysisManager
Value: Create
Key : Analysis.Elapsed.mSec
Value: 7827
Key : Analysis.Init.CPU.mSec
Value: 609
Key : Analysis.Init.Elapsed.mSec
Value: 14822
Key : Analysis.Memory.CommitPeak.Mb
Value: 74
FILE_IN_CAB: 122821-35531-01.dmp
DUMP_FILE_ATTRIBUTES: 0x8
Kernel Generated Triage Dump
BUGCHECK_CODE: 50
BUGCHECK_P1: ffffca800fb80e3e
BUGCHECK_P2: 0
BUGCHECK_P3: fffff8061d86ba8d
BUGCHECK_P4: 0
READ_ADDRESS: fffff806110fb390: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
unable to get nt!MmSpecialPagesInUse
ffffca800fb80e3e
MM_INTERNAL_CODE: 0
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXPNP: 1 (!blackboxpnp)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: vgc.exe
TRAP_FRAME: ffff8906faef4220 -- (.trap 0xffff8906faef4220)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000fd1 rbx=0000000000000000 rcx=ffffca800fb80e3e
rdx=ffffbe86eb3735f2 rsi=0000000000000000 rdi=0000000000000000
rip=fffff8061d86ba8d rsp=ffff8906faef43b8 rbp=ffffe00f4fd710a0
r8=000000000000002b r9=ffffca800fb80e3e r10=0000000000000e3e
r11=ffffca800fb80000 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei ng nz ac pe cy
vgk+0x2ba8d:
fffff806`1d86ba8d 413801 cmp byte ptr [r9],al ds:ffffca80`0fb80e3e=??
Resetting default scope
STACK_TEXT:
ffff8906`faef3f78 fffff806`1084a61f : 00000000`00000050 ffffca80`0fb80e3e 00000000`00000000 ffff8906`faef4220 : nt!KeBugCheckEx
ffff8906`faef3f80 fffff806`1069f470 : ffffca80`1008b1c0 00000000`00000000 ffff8906`faef42a0 00000000`00000000 : nt!MiSystemFault+0x18d18f
ffff8906`faef4080 fffff806`1080525e : 00000000`00000000 ffffca80`0fb80000 00000000`00000000 00000000`00000000 : nt!MmAccessFault+0x400
ffff8906`faef4220 fffff806`1d86ba8d : fffff806`1dfd91c5 ffffe00f`4f0f62f0 00000000`00000001 00000001`02439000 : nt!KiPageFault+0x35e
ffff8906`faef43b8 fffff806`1dfd91c5 : ffffe00f`4f0f62f0 00000000`00000001 00000001`02439000 00000000`00000001 : vgk+0x2ba8d
ffff8906`faef43c0 ffffe00f`4f0f62f0 : 00000000`00000001 00000001`02439000 00000000`00000001 00000000`0000000b : vgk+0x7991c5
ffff8906`faef43c8 00000000`00000001 : 00000001`02439000 00000000`00000001 00000000`0000000b 00000000`00000001 : 0xffffe00f`4f0f62f0
ffff8906`faef43d0 00000001`02439000 : 00000000`00000001 00000000`0000000b 00000000`00000001 00000000`00000001 : 0x1
ffff8906`faef43d8 00000000`00000001 : 00000000`0000000b 00000000`00000001 00000000`00000001 ffffe00f`65002748 : 0x00000001`02439000
ffff8906`faef43e0 00000000`0000000b : 00000000`00000001 00000000`00000001 ffffe00f`65002748 00000000`0000002b : 0x1
ffff8906`faef43e8 00000000`00000001 : 00000000`00000001 ffffe00f`65002748 00000000`0000002b fffff806`1dfd7366 : 0xb
ffff8906`faef43f0 00000000`00000001 : ffffe00f`65002748 00000000`0000002b fffff806`1dfd7366 ffff8906`faef4430 : 0x1
ffff8906`faef43f8 ffffe00f`65002748 : 00000000`0000002b fffff806`1dfd7366 ffff8906`faef4430 00000000`0000002b : 0x1
ffff8906`faef4400 00000000`0000002b : fffff806`1dfd7366 ffff8906`faef4430 00000000`0000002b 00000001`02439000 : 0xffffe00f`65002748
ffff8906`faef4408 fffff806`1dfd7366 : ffff8906`faef4430 00000000`0000002b 00000001`02439000 ffffe00f`4f0f62f0 : 0x2b
ffff8906`faef4410 ffff8906`faef4430 : 00000000`0000002b 00000001`02439000 ffffe00f`4f0f62f0 019a4ac0`89eedf83 : vgk+0x797366
ffff8906`faef4418 00000000`0000002b : 00000001`02439000 ffffe00f`4f0f62f0 019a4ac0`89eedf83 e8955aa1`da3923fa : 0xffff8906`faef4430
ffff8906`faef4420 00000001`02439000 : ffffe00f`4f0f62f0 019a4ac0`89eedf83 e8955aa1`da3923fa c421c5e6`6f60103a : 0x2b
ffff8906`faef4428 ffffe00f`4f0f62f0 : 019a4ac0`89eedf83 e8955aa1`da3923fa c421c5e6`6f60103a 5bd090b9`fad6e1ff : 0x00000001`02439000
ffff8906`faef4430 019a4ac0`89eedf83 : e8955aa1`da3923fa c421c5e6`6f60103a 5bd090b9`fad6e1ff 32203299`d6a0deaa : 0xffffe00f`4f0f62f0
ffff8906`faef4438 e8955aa1`da3923fa : c421c5e6`6f60103a 5bd090b9`fad6e1ff 32203299`d6a0deaa 00000000`001349fc : 0x019a4ac0`89eedf83
ffff8906`faef4440 c421c5e6`6f60103a : 5bd090b9`fad6e1ff 32203299`d6a0deaa 00000000`001349fc 00000000`00000000 : 0xe8955aa1`da3923fa
ffff8906`faef4448 5bd090b9`fad6e1ff : 32203299`d6a0deaa 00000000`001349fc 00000000`00000000 00000000`00000000 : 0xc421c5e6`6f60103a
ffff8906`faef4450 32203299`d6a0deaa : 00000000`001349fc 00000000`00000000 00000000`00000000 00000000`00000000 : 0x5bd090b9`fad6e1ff
ffff8906`faef4458 00000000`001349fc : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x32203299`d6a0deaa
ffff8906`faef4460 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x1349fc
SYMBOL_NAME: vgk+2ba8d
MODULE_NAME: vgk
IMAGE_NAME: vgk.sys
STACK_COMMAND: .cxr; .ecxr ; kb
BUCKET_ID_FUNC_OFFSET: 2ba8d
FAILURE_BUCKET_ID: AV_R_(null)_vgk!unknown_function
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {2c74f9bf-c695-1cb8-996e-ae91d1a2ef92}
Followup: MachineOwner
---------
MEMORY_MANAGEMENT (1a)
# Any other values for parameter 1 must be individually examined.
Arguments:
Arg1: 0000000000061941, The subtype of the BugCheck.
Arg2: 000056c01b274260
Arg3: 000000000000000d
Arg4: ffff8d0fc31a3b00
Debugging Details:
------------------
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 2530
Key : Analysis.DebugAnalysisManager
Value: Create
Key : Analysis.Elapsed.mSec
Value: 3494
Key : Analysis.Init.CPU.mSec
Value: 718
Key : Analysis.Init.Elapsed.mSec
Value: 14060
Key : Analysis.Memory.CommitPeak.Mb
Value: 73
FILE_IN_CAB: 122621-40921-01.dmp
DUMP_FILE_ATTRIBUTES: 0x8
Kernel Generated Triage Dump
BUGCHECK_CODE: 1a
BUGCHECK_P1: 61941
BUGCHECK_P2: 56c01b274260
BUGCHECK_P3: d
BUGCHECK_P4: ffff8d0fc31a3b00
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXPNP: 1 (!blackboxpnp)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: chrome.exe
STACK_TEXT:
ffff8d0f`c31a3958 fffff806`51e44254 : 00000000`0000001a 00000000`00061941 000056c0`1b274260 00000000`0000000d : nt!KeBugCheckEx
ffff8d0f`c31a3960 fffff806`51e0525e : ffff900a`db0a2080 00000000`00000000 00000000`00000000 ffff900a`00000000 : nt!MmAccessFault+0x1a51e4
ffff8d0f`c31a3b00 00007ff9`225d97ef : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiPageFault+0x35e
000000be`e55ff6a0 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ff9`225d97ef
MODULE_NAME: hardware
IMAGE_NAME: hardware_ram
STACK_COMMAND: .cxr; .ecxr ; kb
FAILURE_BUCKET_ID: 0x1a_61941_PAGE_TABLE_RESERVED_BITS_SET_IMAGE_hardware_ram
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {c6e5c6cf-692e-7852-5dc5-b74944540fc0}
Followup: MachineOwner
---------