2: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
PAGE_FAULT_IN_NONPAGED_AREA (50)
Invalid system memory was referenced. This cannot be protected by try-except.
Typically the address is just plain bad or it is pointing at freed memory.
Arguments:
Arg1: fffff6875b7259d0, memory referenced.
Arg2: 0000000000000000, X64: bit 0 set if the fault was due to a not-present PTE.
bit 1 is set if the fault was due to a write, clear if a read.
bit 3 is set if the processor decided the fault was due to a corrupted PTE.
bit 4 is set if the fault was due to attempted execute of a no-execute PTE.
- ARM64: bit 1 is set if the fault was due to a write, clear if a read.
bit 3 is set if the fault was due to attempted execute of a no-execute PTE.
Arg3: fffff8025f2e83ba, If non-zero, the instruction address which referenced the bad memory
address.
Arg4: 0000000000000002, (reserved)
Debugging Details:
------------------
KEY_VALUES_STRING: 1
Key : AV.Type
Value: Read
Key : Analysis.CPU.mSec
Value: 3624
Key : Analysis.Elapsed.mSec
Value: 6510
Key : Analysis.IO.Other.Mb
Value: 7
Key : Analysis.IO.Read.Mb
Value: 2
Key : Analysis.IO.Write.Mb
Value: 24
Key : Analysis.Init.CPU.mSec
Value: 1046
Key : Analysis.Init.Elapsed.mSec
Value: 37438
Key : Analysis.Memory.CommitPeak.Mb
Value: 140
Key : Bugcheck.Code.LegacyAPI
Value: 0x50
Key : Failure.Bucket
Value: AV_R_(null)_nt!KeContextFromKframes
Key : Failure.Hash
Value: {e5da468f-45b6-515a-7c9f-c0e4bb174032}
Key : WER.OS.Branch
Value: vb_release
Key : WER.OS.Version
Value: 10.0.19041.1
BUGCHECK_CODE: 50
BUGCHECK_P1: fffff6875b7259d0
BUGCHECK_P2: 0
BUGCHECK_P3: fffff8025f2e83ba
BUGCHECK_P4: 2
FILE_IN_CAB: 062423-49968-01.dmp
READ_ADDRESS: fffff8025fcfb390: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
unable to get nt!MmSpecialPagesInUse
fffff6875b7259d0
LEGACY_PAGE_TABLE_ACCESS: 1
MM_INTERNAL_CODE: 2
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXPNP: 1 (!blackboxpnp)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: opera.exe
TRAP_FRAME: ffff800000000000 -- (.trap 0xffff800000000000)
Unable to read trap frame at ffff8000`00000000
STACK_TEXT:
fffff687`d0724c78 fffff802`5f44af53 : 00000000`00000050 fffff687`5b7259d0 00000000`00000000 fffff687`d0724f20 : nt!KeBugCheckEx
fffff687`d0724c80 fffff802`5f26e7b0 : 00000000`00000000 00000000`00000000 fffff687`d0724fa0 00000000`00000000 : nt!MiSystemFault+0x1b2563
fffff687`d0724d80 fffff802`5f40bad8 : 00000000`00000000 00000000`5e3ba400 00000000`00000000 00000000`00000000 : nt!MmAccessFault+0x400
fffff687`d0724f20 fffff802`5f2e83ba : ffffa08e`99aed138 fffff802`5e3b5c18 00000000`00000000 00000000`00000000 : nt!KiPageFault+0x358
fffff687`d07250b0 fffff802`5f2e7aa7 : fffff687`d0725a58 fffff687`d0725790 fffff687`d0725120 ffffffff`5ffffffd : nt!KeContextFromKframes+0x25a
fffff687`d07250f0 fffff802`5f41016c : 00000000`00001000 fffff687`d0725b00 ffff8000`00000000 00000000`00000000 : nt!KiDispatchException+0x127
fffff687`d0725920 fffff802`5f40bbbd : ffffa08e`9b9e1000 ffffa08e`98d335e0 fffff687`d0725b80 ffffffff`ff676980 : nt!KiExceptionDispatch+0x12c
fffff687`d0725b00 00007ff8`efc32982 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiPageFault+0x43d
00000099`3d9ff390 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ff8`efc32982
SYMBOL_NAME: nt!KeContextFromKframes+25a
MODULE_NAME: nt
IMAGE_NAME: ntkrnlmp.exe
IMAGE_VERSION: 10.0.19041.3086
STACK_COMMAND: .cxr; .ecxr ; kb
BUCKET_ID_FUNC_OFFSET: 25a
FAILURE_BUCKET_ID: AV_R_(null)_nt!KeContextFromKframes
OS_VERSION: 10.0.19041.1
BUILDLAB_STR: vb_release
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {e5da468f-45b6-515a-7c9f-c0e4bb174032}
Followup: MachineOwner
---------