2: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
PAGE_FAULT_IN_NONPAGED_AREA (50)
Invalid system memory was referenced. This cannot be protected by try-except.
Typically the address is just plain bad or it is pointing at freed memory.
Arguments:
Arg1: ffff838000000000, memory referenced.
Arg2: 0000000000000000, X64: bit 0 set if the fault was due to a not-present PTE.
bit 1 is set if the fault was due to a write, clear if a read.
bit 3 is set if the processor decided the fault was due to a corrupted PTE.
bit 4 is set if the fault was due to attempted execute of a no-execute PTE.
- ARM64: bit 1 is set if the fault was due to a write, clear if a read.
bit 3 is set if the fault was due to attempted execute of a no-execute PTE.
Arg3: 0000000000000000, If non-zero, the instruction address which referenced the bad memory
address.
Arg4: 0000000000000006, (reserved)
Debugging Details:
------------------
KEY_VALUES_STRING: 1
Key : AV.Type
Value: Read
Key : Analysis.CPU.mSec
Value: 5233
Key : Analysis.Elapsed.mSec
Value: 9404
Key : Analysis.IO.Other.Mb
Value: 4
Key : Analysis.IO.Read.Mb
Value: 0
Key : Analysis.IO.Write.Mb
Value: 19
Key : Analysis.Init.CPU.mSec
Value: 1155
Key : Analysis.Init.Elapsed.mSec
Value: 21593
Key : Analysis.Memory.CommitPeak.Mb
Value: 88
Key : Bugcheck.Code.LegacyAPI
Value: 0x50
Key : Bugcheck.Code.TargetModel
Value: 0x50
Key : Failure.Bucket
Value: AV_R_(null)_TeeDriverW8x64!unknown_function
Key : Failure.Hash
Value: {eea2596f-dd24-2d58-0d86-254ca00d5ae8}
Key : WER.OS.Branch
Value: vb_release
Key : WER.OS.Version
Value: 10.0.19041.1
BUGCHECK_CODE: 50
BUGCHECK_P1: ffff838000000000
BUGCHECK_P2: 0
BUGCHECK_P3: 0
BUGCHECK_P4: 6
FILE_IN_CAB: 052524-5796-01.dmp
READ_ADDRESS: fffff80273afb390: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
unable to get nt!MmSpecialPagesInUse
ffff838000000000
MM_INTERNAL_CODE: 6
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: System
TRAP_FRAME: ffff8b8ba304bb20 -- (.trap 0xffff8b8ba304bb20)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=ffff83c1e0f07000 rbx=0000000000000000 rcx=ffff838000000000
rdx=ffff83c1e0f07000 rsi=0000000000000000 rdi=0000000000000000
rip=fffff802730805f0 rsp=ffff8b8ba304bcb8 rbp=ffff83c1e0f07000
r8=ffff83c1e0e00000 r9=0000000000000002 r10=0000000000000002
r11=ffff838000000000 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei pl zr na po nc
nt!MI_READ_PTE_LOCK_FREE:
fffff802`730805f0 488b01 mov rax,qword ptr [rcx] ds:ffff8380`00000000=????????????????
Resetting default scope
STACK_TEXT:
ffff8b8b`a304b798 fffff802`7324863d : 00000000`00000050 ffff8380`00000000 00000000`00000000 ffff83c1`e0e00000 : nt!KeBugCheckEx
ffff8b8b`a304b7a0 fffff802`73024f27 : 00000000`00000000 00000000`00000000 ffff8b8b`a304bb20 00000000`00000000 : nt!MiInPagePageTable+0x1ad77d
ffff8b8b`a304b8f0 fffff802`730243ca : 00000000`00000000 00000000`00000000 ffff8b8b`a304bba0 00000000`00000000 : nt!MiUserFault+0x5e7
ffff8b8b`a304b980 fffff802`7320d458 : ffff8b8b`a304bc00 ffffa20f`5d645fe8 ffffa20f`54e02280 fffff802`7303934a : nt!MmAccessFault+0x16a
ffff8b8b`a304bb20 fffff802`730805f0 : fffff802`730edf11 00000000`00000200 00000000`00000000 00000000`00008030 : nt!KiPageFault+0x358
ffff8b8b`a304bcb8 fffff802`730edf11 : 00000000`00000200 00000000`00000000 00000000`00008030 fffff802`737b7074 : nt!MI_READ_PTE_LOCK_FREE
ffff8b8b`a304bcc0 fffff802`b5946c3a : ffffa20f`00000000 ffffa20f`5c816760 00000000`00000000 ffff8380`00008000 : nt!MmBuildMdlForNonPagedPool+0x1f1
ffff8b8b`a304bd80 ffffa20f`00000000 : ffffa20f`5c816760 00000000`00000000 ffff8380`00008000 00000000`00000000 : TeeDriverW8x64+0x16c3a
ffff8b8b`a304bd88 ffffa20f`5c816760 : 00000000`00000000 ffff8380`00008000 00000000`00000000 ffff8b8b`a304be08 : 0xffffa20f`00000000
ffff8b8b`a304bd90 00000000`00000000 : ffff8380`00008000 00000000`00000000 ffff8b8b`a304be08 00000000`00000000 : 0xffffa20f`5c816760
SYMBOL_NAME: TeeDriverW8x64+16c3a
MODULE_NAME: TeeDriverW8x64
IMAGE_NAME: TeeDriverW8x64.sys
STACK_COMMAND: .cxr; .ecxr ; kb
BUCKET_ID_FUNC_OFFSET: 16c3a
FAILURE_BUCKET_ID: AV_R_(null)_TeeDriverW8x64!unknown_function
OS_VERSION: 10.0.19041.1
BUILDLAB_STR: vb_release
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {eea2596f-dd24-2d58-0d86-254ca00d5ae8}
Followup: MachineOwner
---------
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
PAGE_FAULT_IN_NONPAGED_AREA (50)
Invalid system memory was referenced. This cannot be protected by try-except.
Typically the address is just plain bad or it is pointing at freed memory.
Arguments:
Arg1: ffff838000000000, memory referenced.
Arg2: 0000000000000000, X64: bit 0 set if the fault was due to a not-present PTE.
bit 1 is set if the fault was due to a write, clear if a read.
bit 3 is set if the processor decided the fault was due to a corrupted PTE.
bit 4 is set if the fault was due to attempted execute of a no-execute PTE.
- ARM64: bit 1 is set if the fault was due to a write, clear if a read.
bit 3 is set if the fault was due to attempted execute of a no-execute PTE.
Arg3: 0000000000000000, If non-zero, the instruction address which referenced the bad memory
address.
Arg4: 0000000000000006, (reserved)
Debugging Details:
------------------
KEY_VALUES_STRING: 1
Key : AV.Type
Value: Read
Key : Analysis.CPU.mSec
Value: 5233
Key : Analysis.Elapsed.mSec
Value: 9404
Key : Analysis.IO.Other.Mb
Value: 4
Key : Analysis.IO.Read.Mb
Value: 0
Key : Analysis.IO.Write.Mb
Value: 19
Key : Analysis.Init.CPU.mSec
Value: 1155
Key : Analysis.Init.Elapsed.mSec
Value: 21593
Key : Analysis.Memory.CommitPeak.Mb
Value: 88
Key : Bugcheck.Code.LegacyAPI
Value: 0x50
Key : Bugcheck.Code.TargetModel
Value: 0x50
Key : Failure.Bucket
Value: AV_R_(null)_TeeDriverW8x64!unknown_function
Key : Failure.Hash
Value: {eea2596f-dd24-2d58-0d86-254ca00d5ae8}
Key : WER.OS.Branch
Value: vb_release
Key : WER.OS.Version
Value: 10.0.19041.1
BUGCHECK_CODE: 50
BUGCHECK_P1: ffff838000000000
BUGCHECK_P2: 0
BUGCHECK_P3: 0
BUGCHECK_P4: 6
FILE_IN_CAB: 052524-5796-01.dmp
READ_ADDRESS: fffff80273afb390: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
unable to get nt!MmSpecialPagesInUse
ffff838000000000
MM_INTERNAL_CODE: 6
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: System
TRAP_FRAME: ffff8b8ba304bb20 -- (.trap 0xffff8b8ba304bb20)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=ffff83c1e0f07000 rbx=0000000000000000 rcx=ffff838000000000
rdx=ffff83c1e0f07000 rsi=0000000000000000 rdi=0000000000000000
rip=fffff802730805f0 rsp=ffff8b8ba304bcb8 rbp=ffff83c1e0f07000
r8=ffff83c1e0e00000 r9=0000000000000002 r10=0000000000000002
r11=ffff838000000000 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei pl zr na po nc
nt!MI_READ_PTE_LOCK_FREE:
fffff802`730805f0 488b01 mov rax,qword ptr [rcx] ds:ffff8380`00000000=????????????????
Resetting default scope
STACK_TEXT:
ffff8b8b`a304b798 fffff802`7324863d : 00000000`00000050 ffff8380`00000000 00000000`00000000 ffff83c1`e0e00000 : nt!KeBugCheckEx
ffff8b8b`a304b7a0 fffff802`73024f27 : 00000000`00000000 00000000`00000000 ffff8b8b`a304bb20 00000000`00000000 : nt!MiInPagePageTable+0x1ad77d
ffff8b8b`a304b8f0 fffff802`730243ca : 00000000`00000000 00000000`00000000 ffff8b8b`a304bba0 00000000`00000000 : nt!MiUserFault+0x5e7
ffff8b8b`a304b980 fffff802`7320d458 : ffff8b8b`a304bc00 ffffa20f`5d645fe8 ffffa20f`54e02280 fffff802`7303934a : nt!MmAccessFault+0x16a
ffff8b8b`a304bb20 fffff802`730805f0 : fffff802`730edf11 00000000`00000200 00000000`00000000 00000000`00008030 : nt!KiPageFault+0x358
ffff8b8b`a304bcb8 fffff802`730edf11 : 00000000`00000200 00000000`00000000 00000000`00008030 fffff802`737b7074 : nt!MI_READ_PTE_LOCK_FREE
ffff8b8b`a304bcc0 fffff802`b5946c3a : ffffa20f`00000000 ffffa20f`5c816760 00000000`00000000 ffff8380`00008000 : nt!MmBuildMdlForNonPagedPool+0x1f1
ffff8b8b`a304bd80 ffffa20f`00000000 : ffffa20f`5c816760 00000000`00000000 ffff8380`00008000 00000000`00000000 : TeeDriverW8x64+0x16c3a
ffff8b8b`a304bd88 ffffa20f`5c816760 : 00000000`00000000 ffff8380`00008000 00000000`00000000 ffff8b8b`a304be08 : 0xffffa20f`00000000
ffff8b8b`a304bd90 00000000`00000000 : ffff8380`00008000 00000000`00000000 ffff8b8b`a304be08 00000000`00000000 : 0xffffa20f`5c816760
SYMBOL_NAME: TeeDriverW8x64+16c3a
MODULE_NAME: TeeDriverW8x64
IMAGE_NAME: TeeDriverW8x64.sys
STACK_COMMAND: .cxr; .ecxr ; kb
BUCKET_ID_FUNC_OFFSET: 16c3a
FAILURE_BUCKET_ID: AV_R_(null)_TeeDriverW8x64!unknown_function
OS_VERSION: 10.0.19041.1
BUILDLAB_STR: vb_release
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {eea2596f-dd24-2d58-0d86-254ca00d5ae8}
Followup: MachineOwner
---------

