*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
IRQL_NOT_LESS_OR_EQUAL (a)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high. This is usually
caused by drivers using improper addresses.
If a kernel debugger is available get the stack backtrace.
Arguments:
Arg1: 0000000000000000, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000000, bitfield :
bit 0 : value 0 = read operation, 1 = write operation
bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
Arg4: fffff8053d248663, address which referenced memory
Debugging Details:
------------------
KEY_VALUES_STRING: 1
PROCESSES_ANALYSIS: 1
SERVICE_ANALYSIS: 1
STACKHASH_ANALYSIS: 1
TIMELINE_ANALYSIS: 1
DUMP_CLASS: 1
DUMP_QUALIFIER: 400
BUILD_VERSION_STRING: 10.0.18362.476 (WinBuild.160101.0800)
DUMP_FILE_ATTRIBUTES: 0x8
Kernel Generated Triage Dump
DUMP_TYPE: 2
BUGCHECK_P1: 0
BUGCHECK_P2: 2
BUGCHECK_P3: 0
BUGCHECK_P4: fffff8053d248663
READ_ADDRESS: fffff8053d7733b8: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
0000000000000000
CURRENT_IRQL: 2
FAULTING_IP:
nt!KeSetEvent+173
fffff805`3d248663 4d8b36 mov r14,qword ptr [r14]
CPU_COUNT: c
CPU_MHZ: e74
CPU_VENDOR: AuthenticAMD
CPU_FAMILY: 17
CPU_MODEL: 8
CPU_STEPPING: 2
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: WIN8_DRIVER_FAULT
BUGCHECK_STR: AV
PROCESS_NAME: System
ANALYSIS_SESSION_HOST: DESKTOP-18V31A3
ANALYSIS_SESSION_TIME: 11-22-2019 21:36:26.0650
ANALYSIS_VERSION: 10.0.18362.1 x86fre
TRAP_FRAME: ffffb8079ea81e50 -- (.trap 0xffffb8079ea81e50)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000000 rbx=0000000000000000 rcx=ffffa78af3b01948
rdx=0000000000000000 rsi=0000000000000000 rdi=0000000000000000
rip=fffff8053d248663 rsp=ffffb8079ea81fe0 rbp=0000000000000000
r8=0000000000000000 r9=ffffe284c4020b30 r10=fffff8053d2484f0
r11=ffffb8079ea82a68 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei pl nz na pe cy
nt!KeSetEvent+0x173:
fffff805`3d248663 4d8b36 mov r14,qword ptr [r14] ds:00000000`00000000=????????????????
Resetting default scope
LAST_CONTROL_TRANSFER: from fffff8053d3d32e9 to fffff8053d3c14e0
STACK_TEXT:
ffffb807`9ea81d08 fffff805`3d3d32e9 : 00000000`0000000a 00000000`00000000 00000000`00000002 00000000`00000000 : nt!KeBugCheckEx
ffffb807`9ea81d10 fffff805`3d3cf62b : 00000000`00000000 00000000`00000000 00000000`00000002 00000000`00000000 : nt!KiBugCheckDispatch+0x69
ffffb807`9ea81e50 fffff805`3d248663 : ffffa78a`f3b01948 00000291`793fffff ffffa78a`f3b81948 00000000`00400000 : nt!KiPageFault+0x46b
ffffb807`9ea81fe0 fffff805`4b61af0a : 00000001`ffffffff 00000000`00000f7f 00000000`00000006 00000008`00000001 : nt!KeSetEvent+0x173
ffffb807`9ea82070 fffff805`4b620a08 : ffffb807`9ea821c9 ffffa78a`f562a9b8 00000000`00000f7f ffffa78a`f6c95901 : dxgmms2!VidSchiUpdateContextStatus+0x5da
ffffb807`9ea820f0 fffff805`4b6c5e1a : ffffa78a`f6c959a0 ffffb807`9ea82200 ffffe284`b8d60d50 ffffa78a`f3b81001 : dxgmms2!VidSchSuspendResumeDevice+0x228
ffffb807`9ea82230 fffff805`4b6aca0b : 00000000`00000000 00000000`000001a0 ffffb807`9ea825b0 ffffa78a`f3b81400 : dxgmms2!VIDMM_PROCESS::SuspendResumeProcessGpuMmuContexts+0x8a
ffffb807`9ea82270 fffff805`4b67eb38 : 00000000`00000000 ffffe284`c51879d0 00000000`00000000 00000000`00000000 : dxgmms2!VIDMM_PAGE_TABLE::CommitVirtualAddressRange+0x2cd5b
ffffb807`9ea82350 fffff805`4b67dd13 : ffffe284`c51879d0 ffffe284`c501d420 ffffb807`9ea825b0 00000000`00000000 : dxgmms2!VIDMM_PAGE_DIRECTORY::CommitVirtualAddressRange+0x9c8
ffffb807`9ea824f0 fffff805`4b67cbd3 : ffffa78a`f7605210 ffffa78a`00000000 00000000`00000001 00000000`00000000 : dxgmms2!CVirtualAddressAllocator::CommitVirtualAddressRange+0x2e3
ffffb807`9ea82660 fffff805`4b687eb2 : ffffa78a`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : dxgmms2!VIDMM_GLOBAL::PageInOneAllocation+0x423
ffffb807`9ea82770 fffff805`4b697da4 : 00000000`00000001 00000000`00989680 ffffe284`c3d17510 00000000`00000001 : dxgmms2!VIDMM_GLOBAL::ProcessDeferredCommand+0x862
ffffb807`9ea829e0 fffff805`4b696ee9 : ffffe284`b0513610 ffffd180`baf35301 ffffa78a`f3bea600 00000000`00000000 : dxgmms2!VIDMM_WORKER_THREAD::Run+0xea4
ffffb807`9ea82be0 fffff805`3d32a7a5 : ffffa78a`f3bea680 fffff805`4b696ee0 ffffe284`b0513610 00000067`b4bbbdff : dxgmms2!VidMmWorkerThreadProc+0x9
ffffb807`9ea82c10 fffff805`3d3c8b2a : ffffd180`baf24180 ffffa78a`f3bea680 fffff805`3d32a750 00630041`003a006c : nt!PspSystemThreadStartup+0x55
ffffb807`9ea82c60 00000000`00000000 : ffffb807`9ea83000 ffffb807`9ea7d000 00000000`00000000 00000000`00000000 : nt!KiStartSystemThread+0x2a
THREAD_SHA1_HASH_MOD_FUNC: ae1b81114ad74730fd661fed4f490ae80046612e
THREAD_SHA1_HASH_MOD_FUNC_OFFSET: 6515ddf4747578fc284db9fb08e5cd5e65b034fe
THREAD_SHA1_HASH_MOD: 9b82a2401e2dc5c8dfa042b3a5314020d61836a1
FOLLOWUP_IP:
dxgmms2!VidSchiUpdateContextStatus+5da
fffff805`4b61af0a e929fdffff jmp dxgmms2!VidSchiUpdateContextStatus+0x308 (fffff805`4b61ac38)
FAULT_INSTR_CODE: fffd29e9
SYMBOL_STACK_INDEX: 4
SYMBOL_NAME: dxgmms2!VidSchiUpdateContextStatus+5da
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: dxgmms2
IMAGE_NAME: dxgmms2.sys
DEBUG_FLR_IMAGE_TIMESTAMP: 0
IMAGE_VERSION: 10.0.18362.449
STACK_COMMAND: .thread ; .cxr ; kb
BUCKET_ID_FUNC_OFFSET: 5da
FAILURE_BUCKET_ID: AV_dxgmms2!VidSchiUpdateContextStatus
BUCKET_ID: AV_dxgmms2!VidSchiUpdateContextStatus
PRIMARY_PROBLEM_CLASS: AV_dxgmms2!VidSchiUpdateContextStatus
TARGET_TIME: 2019-11-22T15:43:35.000Z
OSBUILD: 18362
OSSERVICEPACK: 476
SERVICEPACK_NUMBER: 0
OS_REVISION: 0
SUITE_MASK: 784
PRODUCT_TYPE: 1
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
OSEDITION: Windows 10 WinNt TerminalServer SingleUserTS Personal
OS_LOCALE:
USER_LCID: 0
OSBUILD_TIMESTAMP: 2011-12-30 02:28:41
BUILDDATESTAMP_STR: 160101.0800
BUILDLAB_STR: WinBuild
BUILDOSVER_STR: 10.0.18362.476
ANALYSIS_SESSION_ELAPSED_TIME: ae9
ANALYSIS_SOURCE: KM
FAILURE_ID_HASH_STRING: km:av_dxgmms2!vidschiupdatecontextstatus
FAILURE_ID_HASH: {51af9a05-a6bf-4fb2-846b-559baea37e74}
Followup: MachineOwner
---------