IRQL_NOT_LESS_OR_EQUAL (a)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high. This is usually
caused by drivers using improper addresses.
If a kernel debugger is available get the stack backtrace.
Arguments:
Arg1: fffffd5000846878, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000000, bitfield :
bit 0 : value 0 = read operation, 1 = write operation
bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
Arg4: fffff803edcbcaa6, address which referenced memory
Debugging Details:
------------------
KEY_VALUES_STRING: 1
PROCESSES_ANALYSIS: 1
SERVICE_ANALYSIS: 1
STACKHASH_ANALYSIS: 1
TIMELINE_ANALYSIS: 1
DUMP_CLASS: 1
DUMP_QUALIFIER: 400
BUILD_VERSION_STRING: 9600.17415.amd64fre.winblue_r4.141028-1500
SYSTEM_MANUFACTURER: CASPER BILGISAYAR SISTEMLERI A.S
SYSTEM_PRODUCT_NAME: CASPER NIRVANA
SYSTEM_SKU: CASPER BSWI-D2-J3060
SYSTEM_VERSION: 1.0
BIOS_VENDOR: CASPER BILGISAYAR SISTEMLERI A.S
BIOS_VERSION: 5.11
BIOS_DATE: 09/29/2016
BASEBOARD_MANUFACTURER: CASPER BILGISAYAR SISTEMLERI A.S
BASEBOARD_PRODUCT: CASPER NIRVANA DESKTOP
BASEBOARD_VERSION: 1.0
DUMP_TYPE: 2
BUGCHECK_P1: fffffd5000846878
BUGCHECK_P2: 2
BUGCHECK_P3: 0
BUGCHECK_P4: fffff803edcbcaa6
READ_ADDRESS: GetUlongPtrFromAddress: unable to read from fffff803edf70298
GetUlongPtrFromAddress: unable to read from fffff803edf70520
fffffd5000846878
CURRENT_IRQL: 2
FAULTING_IP:
nt!MiResolveDemandZeroFault+956
fffff803`edcbcaa6 498b4008 mov rax,qword ptr [r8+8]
CPU_COUNT: 2
CPU_MHZ: 640
CPU_VENDOR: GenuineIntel
CPU_FAMILY: 6
CPU_MODEL: 4c
CPU_STEPPING: 4
CPU_MICROCODE: 6,4c,4,0 (F,M,S,R) SIG: 408'00000000 (cache) 408'00000000 (init)
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: WIN8_DRIVER_FAULT
BUGCHECK_STR: AV
PROCESS_NAME: PointBlank.exe
ANALYSIS_SESSION_HOST: DESKTOP-ME9UFOB
ANALYSIS_SESSION_TIME: 04-18-2020 14:29:47.0238
ANALYSIS_VERSION: 10.0.18362.1 amd64fre
TRAP_FRAME: ffffd0005af280f0 -- (.trap 0xffffd0005af280f0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=800000006ce5e86b rbx=0000000000000000 rcx=fffff6c000000000
rdx=00007ffffffeffff rsi=0000000000000000 rdi=0000000000000000
rip=fffff803edcbcaa6 rsp=ffffd0005af28280 rbp=ffffd0005af282c0
r8=fffffd5000846870 r9=0000000000000001 r10=0000000000000003
r11=0000000fffffffff r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei ng nz na pe nc
nt!MiResolveDemandZeroFault+0x956:
fffff803`edcbcaa6 498b4008 mov rax,qword ptr [r8+8] ds:fffffd50`00846878=????????????????
Resetting default scope
LAST_CONTROL_TRANSFER: from fffff803edd694e9 to fffff803edd5d9a0
STACK_TEXT:
ffffd000`5af27fa8 fffff803`edd694e9 : 00000000`0000000a fffffd50`00846878 00000000`00000002 00000000`00000000 : nt!KeBugCheckEx
ffffd000`5af27fb0 fffff803`edd67d3a : 00000000`00000000 00000000`00000003 00000000`00000000 00000000`00000000 : nt!KiBugCheckDispatch+0x69
ffffd000`5af280f0 fffff803`edcbcaa6 : 00000000`00000003 00000000`00000002 00000000`00000000 fffff803`edc7012a : nt!KiPageFault+0x23a
ffffd000`5af28280 fffff803`edc6bec2 : 00000000`00000000 00000000`38186000 ffffd000`5af287b1 ffffc001`50794180 : nt!MiResolveDemandZeroFault+0x956
ffffd000`5af283a0 fffff803`edc69d8b : 00000000`00000380 00000000`38000000 fffff680`001c0000 ffffe001`bd6c17d8 : nt!MiResolveProtoPteFault+0x592
ffffd000`5af28440 fffff803`edc6509f : ffffe001`bd6c17d8 00000000`00000000 00000000`00000000 ffffd000`5af28630 : nt!MiDispatchFault+0x2bb
ffffd000`5af28580 fffff803`edcac5a1 : 00000000`00000000 ffffffff`ffffffff 00000000`ffffff00 ffffffff`ffffffff : nt!MmAccessFault+0x54f
ffffd000`5af28740 fffff803`edcabc31 : 00000000`00000001 fffff803`00000002 ffffd000`00000001 00000000`00000002 : nt!MiProbeLeafFrame+0x3d1
ffffd000`5af28870 fffff801`2a89a59f : 00000000`00000400 ffffd000`5af28f00 ffffc001`00000002 ffffc001`4f556001 : nt!MmProbeAndLockPages+0x241
ffffd000`5af28950 fffff801`2a8996e7 : ffffc001`5088ca00 ffffc001`5088ca00 ffffe001`be6ca930 ffffd000`5af28f00 : dxgmms1!VIDMM_SEGMENT::SafeProbeAndLockPages+0x12f
ffffd000`5af289b0 fffff801`2a86fa31 : 00000000`00000000 fffff801`2a892cbe 00000000`00000002 00000000`00000000 : dxgmms1!VIDMM_GLOBAL::ReferenceDmaBuffer+0x767
ffffd000`5af28d80 fffff801`2a73a049 : 00000000`00000200 ffffd000`5af29a90 ffffc001`4f95dec0 ffffd000`5af28f00 : dxgmms1!VidMmReferenceDmaBuffer+0x55
ffffd000`5af28de0 fffff801`2a732c35 : ffffc001`51a8a000 00000000`00000000 00000000`00000000 00000000`fec63000 : dxgkrnl!DXGCONTEXT::Render+0x229
ffffd000`5af29930 fffff803`edd691b3 : ffffe001`be0c6080 ffffe001`be0c6080 00000000`031e0000 00000000`fec65000 : dxgkrnl!DxgkRender+0x325
ffffd000`5af29c40 00000000`776777fa : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x13
00000000`030ee3a8 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x776777fa
THREAD_SHA1_HASH_MOD_FUNC: 3359f03a46be49f4f4f981fec7f2b74c023b2721
THREAD_SHA1_HASH_MOD_FUNC_OFFSET: 1a769494e732f23ab2bcf5a29cda656a0ecbcc98
THREAD_SHA1_HASH_MOD: 25d39b01828eedce19ed04589a8dd1a5fb863a65
FOLLOWUP_IP:
dxgmms1!VIDMM_SEGMENT::SafeProbeAndLockPages+12f
fffff801`2a89a59f e985000000 jmp dxgmms1!VIDMM_SEGMENT::SafeProbeAndLockPages+0x1b9 (fffff801`2a89a629)
FAULT_INSTR_CODE: 85e9
SYMBOL_STACK_INDEX: 9
SYMBOL_NAME: dxgmms1!VIDMM_SEGMENT::SafeProbeAndLockPages+12f
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: dxgmms1
IMAGE_NAME: dxgmms1.sys
DEBUG_FLR_IMAGE_TIMESTAMP: 54505506
IMAGE_VERSION: 6.3.9600.17415
STACK_COMMAND: .thread ; .cxr ; kb
BUCKET_ID_FUNC_OFFSET: 12f
FAILURE_BUCKET_ID: AV_dxgmms1!VIDMM_SEGMENT::SafeProbeAndLockPages
BUCKET_ID: AV_dxgmms1!VIDMM_SEGMENT::SafeProbeAndLockPages
PRIMARY_PROBLEM_CLASS: AV_dxgmms1!VIDMM_SEGMENT::SafeProbeAndLockPages
TARGET_TIME: 2020-04-18T08:35:12.000Z
OSBUILD: 9600
OSSERVICEPACK: 17415
SERVICEPACK_NUMBER: 0
OS_REVISION: 0
SUITE_MASK: 272
PRODUCT_TYPE: 1
OSPLATFORM_TYPE: x64
OSNAME: Windows 8.1
OSEDITION: Windows 8.1 WinNt TerminalServer SingleUserTS
OS_LOCALE:
USER_LCID: 0
OSBUILD_TIMESTAMP: 2014-10-29 03:38:48
BUILDDATESTAMP_STR: 141028-1500
BUILDLAB_STR: winblue_r4
BUILDOSVER_STR: 6.3.9600.17415.amd64fre.winblue_r4.141028-1500
ANALYSIS_SESSION_ELAPSED_TIME: 1a80
ANALYSIS_SOURCE: KM
FAILURE_ID_HASH_STRING: km:av_dxgmms1!vidmm_segment::safeprobeandlockpages
FAILURE_ID_HASH: {ef2979ff-e4ab-9457-2244-340982265f57}
Followup: MachineOwner
---------
IRQL_NOT_LESS_OR_EQUAL (a)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high. This is usually
caused by drivers using improper addresses.
If a kernel debugger is available get the stack backtrace.
Arguments:
Arg1: 0000000066710010, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000001, bitfield :
bit 0 : value 0 = read operation, 1 = write operation
bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
Arg4: fffff802efedb192, address which referenced memory
Debugging Details:
------------------
KEY_VALUES_STRING: 1
PROCESSES_ANALYSIS: 1
SERVICE_ANALYSIS: 1
STACKHASH_ANALYSIS: 1
TIMELINE_ANALYSIS: 1
DUMP_CLASS: 1
DUMP_QUALIFIER: 400
BUILD_VERSION_STRING: 9600.17415.amd64fre.winblue_r4.141028-1500
SYSTEM_MANUFACTURER: CASPER BILGISAYAR SISTEMLERI A.S
SYSTEM_PRODUCT_NAME: CASPER NIRVANA
SYSTEM_SKU: CASPER BSWI-D2-J3060
SYSTEM_VERSION: 1.0
BIOS_VENDOR: CASPER BILGISAYAR SISTEMLERI A.S
BIOS_VERSION: 5.11
BIOS_DATE: 09/29/2016
BASEBOARD_MANUFACTURER: CASPER BILGISAYAR SISTEMLERI A.S
BASEBOARD_PRODUCT: CASPER NIRVANA DESKTOP
BASEBOARD_VERSION: 1.0
DUMP_TYPE: 2
BUGCHECK_P1: 66710010
BUGCHECK_P2: 2
BUGCHECK_P3: 1
BUGCHECK_P4: fffff802efedb192
WRITE_ADDRESS: GetUlongPtrFromAddress: unable to read from fffff802f01ed298
GetUlongPtrFromAddress: unable to read from fffff802f01ed520
0000000066710010
CURRENT_IRQL: 2
FAULTING_IP:
nt!KxWaitForLockOwnerShip+12
fffff802`efedb192 48890a mov qword ptr [rdx],rcx
CPU_COUNT: 2
CPU_MHZ: 640
CPU_VENDOR: GenuineIntel
CPU_FAMILY: 6
CPU_MODEL: 4c
CPU_STEPPING: 4
CPU_MICROCODE: 6,4c,4,0 (F,M,S,R) SIG: 408'00000000 (cache) 408'00000000 (init)
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: WIN8_DRIVER_FAULT
BUGCHECK_STR: AV
PROCESS_NAME: PointBlank.exe
ANALYSIS_SESSION_HOST: DESKTOP-ME9UFOB
ANALYSIS_SESSION_TIME: 04-18-2020 14:29:49.0819
ANALYSIS_VERSION: 10.0.18362.1 amd64fre
TRAP_FRAME: ffffd00022b593c0 -- (.trap 0xffffd00022b593c0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=fffffa8004800000 rbx=0000000000000000 rcx=ffffd00022b59628
rdx=0000000066710010 rsi=0000000000000000 rdi=0000000000000000
rip=fffff802efedb192 rsp=ffffd00022b59550 rbp=ffffd00022b59600
r8=0000000000000000 r9=0000000000000000 r10=0020006000000000
r11=fffffa8004801460 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei ng nz na po nc
nt!KxWaitForLockOwnerShip+0x12:
fffff802`efedb192 48890a mov qword ptr [rdx],rcx ds:00000000`66710010=????????????????
Resetting default scope
LAST_CONTROL_TRANSFER: from fffff802effe64e9 to fffff802effda9a0
STACK_TEXT:
ffffd000`22b59278 fffff802`effe64e9 : 00000000`0000000a 00000000`66710010 00000000`00000002 00000000`00000001 : nt!KeBugCheckEx
ffffd000`22b59280 fffff802`effe4d3a : 00000000`00000001 fffffa80`004fe120 00000000`00000000 00000000`00000003 : nt!KiBugCheckDispatch+0x69
ffffd000`22b593c0 fffff802`efedb192 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiPageFault+0x23a
ffffd000`22b59550 fffff802`efeee16f : fffffa80`004fe120 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KxWaitForLockOwnerShip+0x12
ffffd000`22b59580 fffff802`efeec01b : 00000000`0001aa06 fffffa80`004fe130 00000000`00000000 00000000`00000000 : nt!MiInsertPageInFreeOrZeroedList+0x7ef
ffffd000`22b596c0 fffff802`eff3a897 : 00000000`00000002 ffffd000`22b59740 00000000`00000242 00000000`00000002 : nt!MiInsertLargePageInFreeOrZeroList+0xdb
ffffd000`22b59710 fffff802`eff3a33f : 00000000`00000008 00000000`00000000 00000000`00000242 00000000`00000001 : nt!MiGetFreeOrZeroPage+0x3e7
ffffd000`22b597b0 fffff802`eff392e3 : 00000000`00000000 00000000`00000002 00000000`00000001 fffff802`eff3ab49 : nt!MiGetPage+0x6f
ffffd000`22b59820 fffff802`efee6e5e : 00000000`00000001 00000000`30954000 ffffd000`22b59c40 fffff680`00184aa0 : nt!MiResolveDemandZeroFault+0x193
ffffd000`22b59940 fffff802`efee209f : ffffe001`044b7558 00000000`30954000 ffffd000`22b59bd0 00000000`00000000 : nt!MiDispatchFault+0x38e
ffffd000`22b59a80 fffff802`effe4c2f : 00000000`00000001 00000000`2e9f8e40 ffffc001`907ef001 ffffc001`907ef000 : nt!MmAccessFault+0x54f
ffffd000`22b59c40 00000000`6c97494a : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiPageFault+0x12f
00000000`061cfd94 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x6c97494a
THREAD_SHA1_HASH_MOD_FUNC: d6636dbb959ce8b41ab0f437250fc3072f1e80da
THREAD_SHA1_HASH_MOD_FUNC_OFFSET: 441af99844d266e1076fa5f6e98394b7e5510b33
THREAD_SHA1_HASH_MOD: dc844b1b94baa204d070855e43bbbd27eee98b94
FOLLOWUP_IP:
nt!KxWaitForLockOwnerShip+12
fffff802`efedb192 48890a mov qword ptr [rdx],rcx
FAULT_INSTR_CODE: 330a8948
SYMBOL_STACK_INDEX: 3
SYMBOL_NAME: nt!KxWaitForLockOwnerShip+12
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: nt
IMAGE_NAME: ntkrnlmp.exe
DEBUG_FLR_IMAGE_TIMESTAMP: 54503718
IMAGE_VERSION: 6.3.9600.17415
STACK_COMMAND: .thread ; .cxr ; kb
BUCKET_ID_FUNC_OFFSET: 12
FAILURE_BUCKET_ID: AV_nt!KxWaitForLockOwnerShip
BUCKET_ID: AV_nt!KxWaitForLockOwnerShip
PRIMARY_PROBLEM_CLASS: AV_nt!KxWaitForLockOwnerShip
TARGET_TIME: 2020-04-18T07:34:04.000Z
OSBUILD: 9600
OSSERVICEPACK: 17415
SERVICEPACK_NUMBER: 0
OS_REVISION: 0
SUITE_MASK: 272
PRODUCT_TYPE: 1
OSPLATFORM_TYPE: x64
OSNAME: Windows 8.1
OSEDITION: Windows 8.1 WinNt TerminalServer SingleUserTS
OS_LOCALE:
USER_LCID: 0
OSBUILD_TIMESTAMP: 2014-10-29 03:38:48
BUILDDATESTAMP_STR: 141028-1500
BUILDLAB_STR: winblue_r4
BUILDOSVER_STR: 6.3.9600.17415.amd64fre.winblue_r4.141028-1500
ANALYSIS_SESSION_ELAPSED_TIME: 46e
ANALYSIS_SOURCE: KM
FAILURE_ID_HASH_STRING: km:av_nt!kxwaitforlockownership
FAILURE_ID_HASH: {724b07b1-4226-85fe-f372-16d33b9a3b93}
Followup: MachineOwner
---------
MEMORY_MANAGEMENT (1a)
# Any other values for parameter 1 must be individually examined.
Arguments:
Arg1: 0000000000041284, A PTE or the working set list is corrupt.
Arg2: 00000000365f3000
Arg3: 000000000001f4db
Arg4: fffff58010804000
Debugging Details:
------------------
KEY_VALUES_STRING: 1
PROCESSES_ANALYSIS: 1
SERVICE_ANALYSIS: 1
STACKHASH_ANALYSIS: 1
TIMELINE_ANALYSIS: 1
DUMP_CLASS: 1
DUMP_QUALIFIER: 400
BUILD_VERSION_STRING: 9600.17415.amd64fre.winblue_r4.141028-1500
SYSTEM_MANUFACTURER: CASPER BILGISAYAR SISTEMLERI A.S
SYSTEM_PRODUCT_NAME: CASPER NIRVANA
SYSTEM_SKU: CASPER BSWI-D2-J3060
SYSTEM_VERSION: 1.0
BIOS_VENDOR: CASPER BILGISAYAR SISTEMLERI A.S
BIOS_VERSION: 5.11
BIOS_DATE: 09/29/2016
BASEBOARD_MANUFACTURER: CASPER BILGISAYAR SISTEMLERI A.S
BASEBOARD_PRODUCT: CASPER NIRVANA DESKTOP
BASEBOARD_VERSION: 1.0
DUMP_TYPE: 2
BUGCHECK_P1: 41284
BUGCHECK_P2: 365f3000
BUGCHECK_P3: 1f4db
BUGCHECK_P4: fffff58010804000
BUGCHECK_STR: 0x1a_41284
CPU_COUNT: 2
CPU_MHZ: 640
CPU_VENDOR: GenuineIntel
CPU_FAMILY: 6
CPU_MODEL: 4c
CPU_STEPPING: 4
CPU_MICROCODE: 6,4c,4,0 (F,M,S,R) SIG: 408'00000000 (cache) 408'00000000 (init)
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: WIN8_DRIVER_FAULT
PROCESS_NAME: PointBlank.exe
CURRENT_IRQL: 0
ANALYSIS_SESSION_HOST: DESKTOP-ME9UFOB
ANALYSIS_SESSION_TIME: 04-18-2020 14:29:43.0076
ANALYSIS_VERSION: 10.0.18362.1 amd64fre
LAST_CONTROL_TRANSFER: from fffff803129ec43d to fffff803129c59a0
STACK_TEXT:
ffffd001`e1ff7798 fffff803`129ec43d : 00000000`0000001a 00000000`00041284 00000000`365f3000 00000000`0001f4db : nt!KeBugCheckEx
ffffd001`e1ff77a0 fffff803`128d4728 : cdb00001`5a03086f ffffd001`e1ff78f0 fffff680`001b2f98 fffff580`10804000 : nt! ?? ::FNODOBFM::`string'+0x1658d
ffffd001`e1ff77f0 fffff803`12937dc3 : ffffe001`9f7c0568 ffffe001`9d16f4e0 00000000`00000000 00000000`00000000 : nt!MiDeleteVirtualAddresses+0x558
ffffd001`e1ff7a80 fffff803`12cad389 : ffffe001`a01c6620 00000000`36540000 ffffe001`00000000 7fffffff`00000000 : nt!MiDeleteVad+0x233
ffffd001`e1ff7b80 fffff800`f4ad6074 : 00000000`00000000 fffff803`12b27200 ffffe001`a01d7a50 fffff803`12b27300 : nt!MiUnmapViewOfSection+0xfd
ffffd001`e1ff7c50 fffff803`1291138c : fffff803`128ff674 ffffe001`9d16f180 ffffe001`9d16f040 fffff803`12b27300 : dxgmms1!VidMmProcessAsyncOperation+0x4c
ffffd001`e1ff7c90 fffff803`12976c70 : afafafaf`afafafaf ffffe001`9d16f040 00000000`00000080 ffffe001`9d16f040 : nt!ExpWorkerThread+0x28c
ffffd001`e1ff7d40 fffff803`129cbfc6 : fffff803`12b78180 ffffe001`9d16f040 ffffe001`9d13f880 afafafaf`afafafaf : nt!PspSystemThreadStartup+0x58
ffffd001`e1ff7da0 00000000`00000000 : ffffd001`e1ff8000 ffffd001`e1ff2000 00000000`00000000 00000000`00000000 : nt!KiStartSystemThread+0x16
THREAD_SHA1_HASH_MOD_FUNC: 0bdf1083aeea2455c25eec9609c1ac92b8a72afe
THREAD_SHA1_HASH_MOD_FUNC_OFFSET: 48178d863dd522b5a3e1918099a584615114fbda
THREAD_SHA1_HASH_MOD: 39228cfe83a24322e7aa8ed3ae32e8bbb19cc5a8
FOLLOWUP_IP:
dxgmms1!VidMmProcessAsyncOperation+4c
fffff800`f4ad6074 488b4b28 mov rcx,qword ptr [rbx+28h]
FAULT_INSTR_CODE: 284b8b48
SYMBOL_STACK_INDEX: 5
SYMBOL_NAME: dxgmms1!VidMmProcessAsyncOperation+4c
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: dxgmms1
IMAGE_NAME: dxgmms1.sys
DEBUG_FLR_IMAGE_TIMESTAMP: 54505506
IMAGE_VERSION: 6.3.9600.17415
STACK_COMMAND: .thread ; .cxr ; kb
BUCKET_ID_FUNC_OFFSET: 4c
FAILURE_BUCKET_ID: 0x1a_41284_dxgmms1!VidMmProcessAsyncOperation
BUCKET_ID: 0x1a_41284_dxgmms1!VidMmProcessAsyncOperation
PRIMARY_PROBLEM_CLASS: 0x1a_41284_dxgmms1!VidMmProcessAsyncOperation
TARGET_TIME: 2020-04-17T17:18:26.000Z
OSBUILD: 9600
OSSERVICEPACK: 17415
SERVICEPACK_NUMBER: 0
OS_REVISION: 0
SUITE_MASK: 272
PRODUCT_TYPE: 1
OSPLATFORM_TYPE: x64
OSNAME: Windows 8.1
OSEDITION: Windows 8.1 WinNt TerminalServer SingleUserTS
OS_LOCALE:
USER_LCID: 0
OSBUILD_TIMESTAMP: 2014-10-29 03:38:48
BUILDDATESTAMP_STR: 141028-1500
BUILDLAB_STR: winblue_r4
BUILDOSVER_STR: 6.3.9600.17415.amd64fre.winblue_r4.141028-1500
ANALYSIS_SESSION_ELAPSED_TIME: 476
ANALYSIS_SOURCE: KM
FAILURE_ID_HASH_STRING: km:0x1a_41284_dxgmms1!vidmmprocessasyncoperation
FAILURE_ID_HASH: {96cdb27a-c9ec-e3f0-3733-5b92dbafc0c2}
Followup: MachineOwner
---------
SYSTEM_THREAD_EXCEPTION_NOT_HANDLED_M (1000007e)
This is a very common bugcheck. Usually the exception address pinpoints
the driver/function that caused the problem. Always note this address
as well as the link date of the driver/image that contains this address.
Some common problems are exception code 0x80000003. This means a hard
coded breakpoint or assertion was hit, but this system was booted
/NODEBUG. This is not supposed to happen as developers should never have
hardcoded breakpoints in retail code, but ...
If this happens, make sure a debugger gets connected, and the
system is booted /DEBUG. This will let us see why this breakpoint is
happening.
Arguments:
Arg1: ffffffffc0000005, The exception code that was not handled
Arg2: fffff8005a086103, The address that the exception occurred at
Arg3: ffffd001bc26c778, Exception Record Address
Arg4: ffffd001bc26bf80, Context Record Address
Debugging Details:
------------------
KEY_VALUES_STRING: 1
Key : AV.Dereference
Value: NullPtr
Key : AV.Fault
Value: Write
PROCESSES_ANALYSIS: 1
SERVICE_ANALYSIS: 1
STACKHASH_ANALYSIS: 1
TIMELINE_ANALYSIS: 1
DUMP_CLASS: 1
DUMP_QUALIFIER: 400
BUILD_VERSION_STRING: 9600.17415.amd64fre.winblue_r4.141028-1500
SYSTEM_MANUFACTURER: CASPER BILGISAYAR SISTEMLERI A.S
SYSTEM_PRODUCT_NAME: CASPER NIRVANA
SYSTEM_SKU: CASPER BSWI-D2-J3060
SYSTEM_VERSION: 1.0
BIOS_VENDOR: CASPER BILGISAYAR SISTEMLERI A.S
BIOS_VERSION: 5.11
BIOS_DATE: 09/29/2016
BASEBOARD_MANUFACTURER: CASPER BILGISAYAR SISTEMLERI A.S
BASEBOARD_PRODUCT: CASPER NIRVANA DESKTOP
BASEBOARD_VERSION: 1.0
DUMP_TYPE: 2
BUGCHECK_P1: ffffffffc0000005
BUGCHECK_P2: fffff8005a086103
BUGCHECK_P3: ffffd001bc26c778
BUGCHECK_P4: ffffd001bc26bf80
EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - <Unable to get error code text>
FAULTING_IP:
dxgmms1!VidSchiCheckFlipQueueTimeout+13
fffff800`5a086103 80792e00 cmp byte ptr [rcx+2Eh],0
EXCEPTION_RECORD: ffffd001bc26c778 -- (.exr 0xffffd001bc26c778)
ExceptionAddress: fffff8005a086103 (dxgmms1!VidSchiCheckFlipQueueTimeout+0x0000000000000013)
ExceptionCode: c0000005 (Access violation)
ExceptionFlags: 00000000
NumberParameters: 2
Parameter[0]: 0000000000000001
Parameter[1]: 0000000000000000
Attempt to write to address 0000000000000000
CONTEXT: ffffd001bc26bf80 -- (.cxr 0xffffd001bc26bf80)
rax=0000000000000000 rbx=0000000000000000 rcx=ffffe000bc7b4000
rdx=ffffd001bc26ca60 rsi=0000000000000000 rdi=ffffe000bc7b4000
rip=fffff8005a086103 rsp=ffffd001bc26c9b0 rbp=0000000000000009
r8=ffffd001bc26ca68 r9=00000000000000b3 r10=00000000000000b3
r11=ffffd001bc26cab0 r12=fffff78000000320 r13=0000000000000000
r14=ffffe000bc7b4000 r15=0000000000000000
iopl=0 nv up ei ng nz na pe nc
cs=0010 ss=0000 ds=002b es=002b fs=0053 gs=002b efl=00010282
dxgmms1!VidSchiCheckFlipQueueTimeout+0x13:
fffff800`5a086103 80792e00 cmp byte ptr [rcx+2Eh],0 ds:002b:ffffe000`bc7b402e=01
Resetting default scope
CPU_COUNT: 2
CPU_MHZ: 640
CPU_VENDOR: GenuineIntel
CPU_FAMILY: 6
CPU_MODEL: 4c
CPU_STEPPING: 4
CPU_MICROCODE: 6,4c,4,0 (F,M,S,R) SIG: 408'00000000 (cache) 408'00000000 (init)
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: NULL_DEREFERENCE
PROCESS_NAME: System
CURRENT_IRQL: 0
FOLLOWUP_IP:
dxgmms1!VidSchiCheckFlipQueueTimeout+13
fffff800`5a086103 80792e00 cmp byte ptr [rcx+2Eh],0
BUGCHECK_STR: AV
WRITE_ADDRESS: GetUlongPtrFromAddress: unable to read from fffff8015c9e2298
GetUlongPtrFromAddress: unable to read from fffff8015c9e2520
0000000000000000
ERROR_CODE: (NTSTATUS) 0xc0000005 - <Unable to get error code text>
EXCEPTION_CODE_STR: c0000005
EXCEPTION_PARAMETER1: 0000000000000001
EXCEPTION_PARAMETER2: 0000000000000000
ANALYSIS_SESSION_HOST: DESKTOP-ME9UFOB
ANALYSIS_SESSION_TIME: 04-18-2020 14:29:41.0710
ANALYSIS_VERSION: 10.0.18362.1 amd64fre
LAST_CONTROL_TRANSFER: from fffff8005a0a7b0a to fffff8005a086103
STACK_TEXT:
ffffd001`bc26c9b0 fffff800`5a0a7b0a : ffffe000`bc7b4000 ffffd001`bc26ca60 ffffd001`bc26ca68 00000000`00000000 : dxgmms1!VidSchiCheckFlipQueueTimeout+0x13
ffffd001`bc26ca40 fffff800`5a085a5a : ffffffff`ff676980 00000000`00000000 ffffd001`bc26cbd0 00000000`00000000 : dxgmms1!VidSchiCheckHwProgress+0xfa
ffffd001`bc26cad0 fffff800`5a0bbfb8 : ffffe000`bc7b4000 ffffe000`bc7b4000 ffffe000`bc7b4000 ffffe000`00000000 : dxgmms1!VidSchiScheduleCommandToRun+0x44a
ffffd001`bc26cc90 fffff800`5a0bbf7d : ffffe000`bc7b4000 ffffe000`00000000 00000000`00000080 ffffe000`ba33a500 : dxgmms1!VidSchiRun_PriorityTable+0x38
ffffd001`bc26cd00 fffff801`5c780c70 : fffff801`5c9dba00 ffffe000`ba33a500 ffffd001`bc26cdd0 fffff801`5c7d2d7d : dxgmms1!VidSchiWorkerThread+0x8d
ffffd001`bc26cd40 fffff801`5c7d5fc6 : fffff801`5c982180 ffffe000`ba33a500 fffff801`5c9dba00 00000000`00000000 : nt!PspSystemThreadStartup+0x58
ffffd001`bc26cda0 00000000`00000000 : ffffd001`bc26d000 ffffd001`bc267000 00000000`00000000 00000000`00000000 : nt!KiStartSystemThread+0x16
THREAD_SHA1_HASH_MOD_FUNC: 4a81989f0cc8b6a31ae399e470c77fcfda82ad03
THREAD_SHA1_HASH_MOD_FUNC_OFFSET: 809981cb9407bbbbb6b8a3d9e87229cd73e85691
THREAD_SHA1_HASH_MOD: 715ea47f0e0475afca9183e1e7654934d827faef
FAULT_INSTR_CODE: 2e7980
SYMBOL_STACK_INDEX: 0
SYMBOL_NAME: dxgmms1!VidSchiCheckFlipQueueTimeout+13
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: dxgmms1
IMAGE_NAME: dxgmms1.sys
DEBUG_FLR_IMAGE_TIMESTAMP: 54505506
IMAGE_VERSION: 6.3.9600.17415
STACK_COMMAND: .cxr 0xffffd001bc26bf80 ; kb
BUCKET_ID_FUNC_OFFSET: 13
FAILURE_BUCKET_ID: AV_dxgmms1!VidSchiCheckFlipQueueTimeout
BUCKET_ID: AV_dxgmms1!VidSchiCheckFlipQueueTimeout
PRIMARY_PROBLEM_CLASS: AV_dxgmms1!VidSchiCheckFlipQueueTimeout
TARGET_TIME: 2020-04-17T14:22:38.000Z
OSBUILD: 9600
OSSERVICEPACK: 17415
SERVICEPACK_NUMBER: 0
OS_REVISION: 0
SUITE_MASK: 272
PRODUCT_TYPE: 1
OSPLATFORM_TYPE: x64
OSNAME: Windows 8.1
OSEDITION: Windows 8.1 WinNt TerminalServer SingleUserTS
OS_LOCALE:
USER_LCID: 0
OSBUILD_TIMESTAMP: 2014-10-29 03:38:48
BUILDDATESTAMP_STR: 141028-1500
BUILDLAB_STR: winblue_r4
BUILDOSVER_STR: 6.3.9600.17415.amd64fre.winblue_r4.141028-1500
ANALYSIS_SESSION_ELAPSED_TIME: 47c
ANALYSIS_SOURCE: KM
FAILURE_ID_HASH_STRING: km:av_dxgmms1!vidschicheckflipqueuetimeout
FAILURE_ID_HASH: {d4af77c3-ec14-7cc0-eed1-4df665e2fee5}
Followup: MachineOwner