PAGE_FAULT_IN_NONPAGED_AREA (50)
Invalid system memory was referenced. This cannot be protected by try-except.
Typically the address is just plain bad or it is pointing at freed memory.
Arguments:
Arg1: ffffa00ef9ab7000, memory referenced.
Arg2: 0000000000000000, value 0 = read operation, 1 = write operation.
Arg3: fffff80744510224, If non-zero, the instruction address which referenced the bad memory
address.
Arg4: 0000000000000000, (reserved)
Debugging Details:
------------------
Could not read faulting driver name
*** WARNING: Unable to verify checksum for win32k.sys
KEY_VALUES_STRING: 1
Key : Analysis.CPU.Sec
Value: 5
Key : Analysis.DebugAnalysisProvider.CPP
Value: Create: 8007007e on DESKTOP-1IBQR0U
Key : Analysis.DebugData
Value: CreateObject
Key : Analysis.DebugModel
Value: CreateObject
Key : Analysis.Elapsed.Sec
Value: 19
Key : Analysis.Memory.CommitPeak.Mb
Value: 70
Key : Analysis.System
Value: CreateObject
ADDITIONAL_XML: 1
BUGCHECK_CODE: 50
BUGCHECK_P1: ffffa00ef9ab7000
BUGCHECK_P2: 0
BUGCHECK_P3: fffff80744510224
BUGCHECK_P4: 0
READ_ADDRESS: fffff807369733b8: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
fffff8073682a3c8: Unable to get Flags value from nt!KdVersionBlock
fffff8073682a3c8: Unable to get Flags value from nt!KdVersionBlock
unable to get nt!MmSpecialPagesInUse
ffffa00ef9ab7000
MM_INTERNAL_CODE: 0
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXPNP: 1 (!blackboxpnp)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: System
TRAP_FRAME: ffff818314bf4880 -- (.trap 0xffff818314bf4880)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000001 rbx=0000000000000000 rcx=ffffa00ef8cf7be0
rdx=ffffa00ef9ab6890 rsi=0000000000000000 rdi=0000000000000000
rip=fffff80744510224 rsp=ffff818314bf4a10 rbp=0000000000000051
r8=ffff818314bf4d70 r9=0000000000000770 r10=000000000009e762
r11=ffffa00ef9ab6890 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei pl nz na pe nc
dxgmms2!VIDMM_PAGE_TABLE::ModifyPageTable+0xf4:
fffff807`44510224 42843c0a test byte ptr [rdx+r9],dil ds:ffffa00e`f9ab7000=??
Resetting default scope
STACK_TEXT:
ffff8183`14bf45d8 fffff807`365e3863 : 00000000`00000050 ffffa00e`f9ab7000 00000000`00000000 ffff8183`14bf4880 : nt!KeBugCheckEx
ffff8183`14bf45e0 fffff807`36472eef : 00000000`00000000 00000000`00000000 00000000`00000000 ffffa00e`f9ab7000 : nt!MiSystemFault+0x1d6af3
ffff8183`14bf46e0 fffff807`365cf520 : ffffe30b`39643700 00000000`005ed000 00000000`00000200 ffffa00e`f9ab2890 : nt!MmAccessFault+0x34f
ffff8183`14bf4880 fffff807`44510224 : 00000000`0003e000 ffffa00e`f8cf7be0 00000000`00000200 fffff807`4450fe35 : nt!KiPageFault+0x360
ffff8183`14bf4a10 fffff807`4450fe35 : 00000000`00000000 00000000`00000000 ffff8183`14bf4d70 00000000`00000000 : dxgmms2!VIDMM_PAGE_TABLE::ModifyPageTable+0xf4
ffff8183`14bf4a30 fffff807`4450eb38 : 00000000`00000000 ffffa00e`f7367950 00000000`00000000 00000000`2c6ab000 : dxgmms2!VIDMM_PAGE_TABLE::CommitVirtualAddressRange+0x185
ffff8183`14bf4b10 fffff807`4450dd13 : ffffa00e`f7367950 ffffa00e`f8c724f0 ffff8183`14bf4d70 00000000`2aaab000 : dxgmms2!VIDMM_PAGE_DIRECTORY::CommitVirtualAddressRange+0x9c8
ffff8183`14bf4cb0 fffff807`444fc510 : ffff8800`00962701 ffffa00e`fac27cf0 00000000`2aaab000 fffff807`00000003 : dxgmms2!CVirtualAddressAllocator::CommitVirtualAddressRange+0x2e3
ffff8183`14bf4e20 fffff807`44521b15 : 00000000`9caeb000 ffff8183`14bf4fa0 ffffe30b`32a47000 00000000`0f000000 : dxgmms2!VIDMM_PAGING_PROCESS::MapScratchAreaVaRange+0x14c
ffff8183`14bf4ea0 fffff807`445218cf : ffffa00e`fac27cf0 00000000`00000000 00000000`00000003 ffffe30b`32a47000 : dxgmms2!VIDMM_GLOBAL::MemoryTransferUsingGpuVaWorker+0x21d
ffff8183`14bf5130 fffff807`4452171c : ffffa00f`13c19910 00000000`00000000 ffffa00e`fac27cf0 00000000`00000000 : dxgmms2!VIDMM_GLOBAL::MemoryTransferInternal+0x127
ffff8183`14bf5330 fffff807`4455eb7f : 00000000`2aaab000 ffff8183`14bf5410 00000000`00000000 00000000`00000000 : dxgmms2!VIDMM_GLOBAL::MemoryTransfer+0x88
ffff8183`14bf53a0 fffff807`44545ffd : 00000000`00000000 00000000`7204000d 00000000`72040000 ffffe30b`2ea11c50 : dxgmms2!VIDMM_MEMORY_SEGMENT::TransferMemorySlow+0x237
ffff8183`14bf5450 fffff807`444fb7cd : 00000000`00000000 ffffe30b`32a47000 00000000`00000000 ffffa00e`fac27cf0 : dxgmms2!VIDMM_MEMORY_SEGMENT::TransferMemory+0x24c09
ffff8183`14bf54a0 fffff807`444fb3c2 : ffffa00f`03969df8 ffffa00f`03969cb0 ffffe30b`32a47ea8 ffffe30b`32a47ea8 : dxgmms2!VIDMM_MEMORY_SEGMENT::TransferToSegment+0x22d
ffff8183`14bf5610 fffff807`4450c99f : ffffe30b`3491d410 ffffe30b`32a47000 00000000`00000000 ffffa00e`fac27cf0 : dxgmms2!VIDMM_MEMORY_SEGMENT::CommitResource+0x62
ffff8183`14bf5660 fffff807`44517eb2 : 00000000`00000000 00000000`00000000 00000000`00000001 00000000`00000000 : dxgmms2!VIDMM_GLOBAL::PageInOneAllocation+0x1ef
ffff8183`14bf5770 fffff807`44527da4 : 00000000`00000001 00000000`00989680 ffffa00f`15d1f1d0 00000000`00000001 : dxgmms2!VIDMM_GLOBAL::ProcessDeferredCommand+0x862
ffff8183`14bf59e0 fffff807`44526ee9 : ffffa00e`f89fad10 fffff807`36991401 ffffe30b`3287e600 00000000`00000000 : dxgmms2!VIDMM_WORKER_THREAD::Run+0xea4
ffff8183`14bf5be0 fffff807`3652a7a5 : ffffe30b`3287e680 fffff807`44526ee0 ffffa00e`f89fad10 00000067`bcbbbdff : dxgmms2!VidMmWorkerThreadProc+0x9
ffff8183`14bf5c10 fffff807`365c8b2a : fffff807`342fd180 ffffe30b`3287e680 fffff807`3652a750 0039007b`ffffffa8 : nt!PspSystemThreadStartup+0x55
ffff8183`14bf5c60 00000000`00000000 : ffff8183`14bf6000 ffff8183`14bf0000 00000000`00000000 00000000`00000000 : nt!KiStartSystemThread+0x2a
SYMBOL_NAME: dxgmms2!VIDMM_PAGE_TABLE::ModifyPageTable+f4
MODULE_NAME: dxgmms2
IMAGE_NAME: dxgmms2.sys
IMAGE_VERSION: 10.0.18362.449
STACK_COMMAND: .thread ; .cxr ; kb
BUCKET_ID_FUNC_OFFSET: f4
FAILURE_BUCKET_ID: AV_R_INVALID_dxgmms2!VIDMM_PAGE_TABLE::ModifyPageTable
OS_VERSION: 10.0.18362.1
BUILDLAB_STR: 19h1_release
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {f9c6c20c-c4a8-7477-c72d-7aebe9a8592c}
Followup: MachineOwner
---------
PAGE_FAULT_IN_NONPAGED_AREA (50)
Invalid system memory was referenced. This cannot be protected by try-except.
Typically the address is just plain bad or it is pointing at freed memory.
Arguments:
Arg1: ffff83046fc6a000, memory referenced.
Arg2: 0000000000000000, value 0 = read operation, 1 = write operation.
Arg3: fffff8036ce70224, If non-zero, the instruction address which referenced the bad memory
address.
Arg4: 0000000000000000, (reserved)
Debugging Details:
------------------
Could not read faulting driver name
*** WARNING: Unable to verify checksum for win32k.sys
KEY_VALUES_STRING: 1
Key : Analysis.CPU.Sec
Value: 4
Key : Analysis.DebugAnalysisProvider.CPP
Value: Create: 8007007e on DESKTOP-1IBQR0U
Key : Analysis.DebugData
Value: CreateObject
Key : Analysis.DebugModel
Value: CreateObject
Key : Analysis.Elapsed.Sec
Value: 9
Key : Analysis.Memory.CommitPeak.Mb
Value: 70
Key : Analysis.System
Value: CreateObject
ADDITIONAL_XML: 1
BUGCHECK_CODE: 50
BUGCHECK_P1: ffff83046fc6a000
BUGCHECK_P2: 0
BUGCHECK_P3: fffff8036ce70224
BUGCHECK_P4: 0
READ_ADDRESS: fffff8035a9733b8: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
fffff8035a82a3c8: Unable to get Flags value from nt!KdVersionBlock
fffff8035a82a3c8: Unable to get Flags value from nt!KdVersionBlock
unable to get nt!MmSpecialPagesInUse
ffff83046fc6a000
MM_INTERNAL_CODE: 0
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXPNP: 1 (!blackboxpnp)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: System
TRAP_FRAME: fffff40a08f92b40 -- (.trap 0xfffff40a08f92b40)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000001 rbx=0000000000000000 rcx=ffff83046eef6be0
rdx=ffff83046fc68cd0 rsi=0000000000000000 rdi=0000000000000000
rip=fffff8036ce70224 rsp=fffff40a08f92cd0 rbp=0000000000000051
r8=fffff40a08f93030 r9=0000000000001330 r10=0000000000083b89
r11=ffff83046fc68cd0 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei pl nz na pe nc
dxgmms2!VIDMM_PAGE_TABLE::ModifyPageTable+0xf4:
fffff803`6ce70224 42843c0a test byte ptr [rdx+r9],dil ds:ffff8304`6fc6a000=??
Resetting default scope
STACK_TEXT:
fffff40a`08f92898 fffff803`5a5e3863 : 00000000`00000050 ffff8304`6fc6a000 00000000`00000000 fffff40a`08f92b40 : nt!KeBugCheckEx
fffff40a`08f928a0 fffff803`5a472eef : 00000000`00000110 00000000`00000000 00000000`00000000 ffff8304`6fc6a000 : nt!MiSystemFault+0x1d6af3
fffff40a`08f929a0 fffff803`5a5cf520 : fffff40a`08f92bd0 fffff803`5a5cf64e 00000000`00000200 fffff803`5a5cf64e : nt!MmAccessFault+0x34f
fffff40a`08f92b40 fffff803`6ce70224 : 00000000`0003c400 ffff8304`6eef6be0 00000000`00000200 fffff803`6ce6fe35 : nt!KiPageFault+0x360
fffff40a`08f92cd0 fffff803`6ce6fe35 : 00000000`00000000 00000000`00000000 fffff40a`08f93030 00000000`00000000 : dxgmms2!VIDMM_PAGE_TABLE::ModifyPageTable+0xf4
fffff40a`08f92cf0 fffff803`6ce6eb38 : 00000000`00000000 ffff8304`6c626c90 00000000`00000000 00000000`15556000 : dxgmms2!VIDMM_PAGE_TABLE::CommitVirtualAddressRange+0x185
fffff40a`08f92dd0 fffff803`6ce6dd13 : ffff8304`6c626c90 ffff8304`6ee73d10 fffff40a`08f93030 00000000`15556000 : dxgmms2!VIDMM_PAGE_DIRECTORY::CommitVirtualAddressRange+0x9c8
fffff40a`08f92f70 fffff803`6ce5c510 : 00000000`7cf49101 ffff8304`7b00fd50 00000000`15556000 00000000`00000003 : dxgmms2!CVirtualAddressAllocator::CommitVirtualAddressRange+0x2e3
fffff40a`08f930e0 fffff803`6ce81ab1 : 00000000`15556000 fffff40a`08f93260 ffff9388`eae36000 00000000`0f000000 : dxgmms2!VIDMM_PAGING_PROCESS::MapScratchAreaVaRange+0x14c
fffff40a`08f93160 fffff803`6ce818cf : ffff8304`7b00fd50 fffff2fc`00000000 fffff2f9`00000003 ffff9388`eae36000 : dxgmms2!VIDMM_GLOBAL::MemoryTransferUsingGpuVaWorker+0x1b9
fffff40a`08f933f0 fffff803`6ce8171c : ffff8304`8d16f210 00000000`00000000 ffff8304`7b00fd50 00000000`00000000 : dxgmms2!VIDMM_GLOBAL::MemoryTransferInternal+0x127
fffff40a`08f935f0 fffff803`6cebeb7f : 00000000`20000000 fffff40a`08f936d0 ffff9388`e7800000 ffff9388`e77a0000 : dxgmms2!VIDMM_GLOBAL::MemoryTransfer+0x88
fffff40a`08f93660 fffff803`6cea5ffd : ffff8304`7b00fd00 00000000`6e50000d 00000000`6e500000 ffff9388`e9108c80 : dxgmms2!VIDMM_MEMORY_SEGMENT::TransferMemorySlow+0x237
fffff40a`08f93710 fffff803`6ce90dc3 : ffff8304`7b00fd01 ffff8304`71484901 ffff8304`7b00fd50 00000000`00000000 : dxgmms2!VIDMM_MEMORY_SEGMENT::TransferMemory+0x24c09
fffff40a`08f93760 fffff803`6ce5ad11 : ffff8304`7b00fd50 ffff8304`00000000 ffff8304`00000001 ffff9388`eae36000 : dxgmms2!VIDMM_MEMORY_SEGMENT::TransferToSystem+0x35ddb
fffff40a`08f938f0 fffff803`6cec0bf3 : ffff9388`e9108d30 ffff8304`714849a0 ffff9388`eae36000 ffff8304`7b00fd50 : dxgmms2!VIDMM_MEMORY_SEGMENT::EvictResource+0xb1
fffff40a`08f93940 fffff803`6ceab502 : ffff8304`715dfd90 ffff9388`eae36000 ffff9388`e9108c80 ffff9388`e9108c80 : dxgmms2!VIDMM_SEGMENT::OldDefragment+0x47
fffff40a`08f93990 fffff803`6ce888b0 : 00000000`0000885c fffff40a`08f93ae0 ffff9388`e9108c80 00000001`451b2858 : dxgmms2!VIDMM_GLOBAL::Defragment+0x20a
fffff40a`08f939e0 fffff803`6ce86ee9 : ffff8304`6c794010 fffff803`5a991401 ffff9388`eac78600 00000000`00000001 : dxgmms2!VIDMM_WORKER_THREAD::Run+0x19b0
fffff40a`08f93be0 fffff803`5a52a7a5 : ffff9388`eac78680 fffff803`6ce86ee0 ffff8304`6c794010 00000067`bcbbbdff : dxgmms2!VidMmWorkerThreadProc+0x9
fffff40a`08f93c10 fffff803`5a5c8b2a : fffff803`586f2180 ffff9388`eac78680 fffff803`5a52a750 00000001`00000001 : nt!PspSystemThreadStartup+0x55
fffff40a`08f93c60 00000000`00000000 : fffff40a`08f94000 fffff40a`08f8e000 00000000`00000000 00000000`00000000 : nt!KiStartSystemThread+0x2a
SYMBOL_NAME: dxgmms2!VIDMM_PAGE_TABLE::ModifyPageTable+f4
MODULE_NAME: dxgmms2
IMAGE_NAME: dxgmms2.sys
IMAGE_VERSION: 10.0.18362.449
STACK_COMMAND: .thread ; .cxr ; kb
BUCKET_ID_FUNC_OFFSET: f4
FAILURE_BUCKET_ID: AV_R_INVALID_dxgmms2!VIDMM_PAGE_TABLE::ModifyPageTable
OS_VERSION: 10.0.18362.1
BUILDLAB_STR: 19h1_release
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {f9c6c20c-c4a8-7477-c72d-7aebe9a8592c}
Followup: MachineOwner
---------