PAGE_FAULT_IN_NONPAGED_AREA (50)
Invalid system memory was referenced. This cannot be protected by try-except.
Typically the address is just plain bad or it is pointing at freed memory.
Arguments:
Arg1: ffffc20012935fd0, memory referenced.
Arg2: 0000000000000000, value 0 = read operation, 1 = write operation.
Arg3: fffff800b7c87a3f, If non-zero, the instruction address which referenced the bad memory
address.
Arg4: 0000000000000002, (reserved)
Debugging Details:
------------------
Could not read faulting driver name
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 1843
Key : Analysis.DebugAnalysisProvider.CPP
Value: Create: 8007007e on DESKTOP-62N06FT
Key : Analysis.DebugData
Value: CreateObject
Key : Analysis.DebugModel
Value: CreateObject
Key : Analysis.Elapsed.mSec
Value: 9863
Key : Analysis.Memory.CommitPeak.Mb
Value: 71
Key : Analysis.System
Value: CreateObject
Key : WER.OS.Branch
Value: th1
Key : WER.OS.Timestamp
Value: 2015-07-09T17:00:00Z
Key : WER.OS.Version
Value: 10.0.10240.16384
ADDITIONAL_XML: 1
OS_BUILD_LAYERS: 1
BUGCHECK_CODE: 50
BUGCHECK_P1: ffffc20012935fd0
BUGCHECK_P2: 0
BUGCHECK_P3: fffff800b7c87a3f
BUGCHECK_P4: 2
READ_ADDRESS: fffff8018f5d2500: Unable to get MiVisibleState
fffff8018f517e80: Unable to get Flags value from nt!KdVersionBlock
ffffc20012935fd0 Paged pool
MM_INTERNAL_CODE: 2
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: metin2client.b
TRAP_FRAME: ffffd000254aa540 -- (.trap 0xffffd000254aa540)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=ffffc00016b76520 rbx=0000000000000000 rcx=ffffc20012935fd0
rdx=ffffc0000be75770 rsi=0000000000000000 rdi=0000000000000000
rip=fffff800b7c87a3f rsp=ffffd000254aa6d0 rbp=ffffe00087013000
r8=0000000000000000 r9=0000000000000008 r10=ffffc00009d749c0
r11=000000000000001d r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei pl zr na po nc
dxgmms1!VIDMM_GLOBAL::ReclaimOneAllocation+0x8f:
fffff800`b7c87a3f 483901 cmp qword ptr [rcx],rax ds:ffffc200`12935fd0=????????????????
Resetting default scope
STACK_TEXT:
ffffd000`254aa2f8 fffff801`8f3abbc5 : 00000000`00000050 ffffc200`12935fd0 00000000`00000000 ffffd000`254aa540 : nt!KeBugCheckEx
ffffd000`254aa300 fffff801`8f22d636 : 00000000`00000000 00000000`00000000 ffffd000`254aa540 fffff801`8f480297 : nt! ?? ::FNODOBFM::`string'+0x423c5
ffffd000`254aa3f0 fffff801`8f363cbd : ffffe000`8be9b090 00000000`00000801 50646641`0000000f 00000000`00000001 : nt!MmAccessFault+0x696
ffffd000`254aa540 fffff800`b7c87a3f : ffffe000`8701cbc0 00000000`00000003 ffffc000`16b76350 00000000`000001a5 : nt!KiPageFault+0x13d
ffffd000`254aa6d0 fffff800`b7c8bbdd : ffffc000`0a41bb40 00000000`00000002 ffffc000`0515eca0 ffffe000`8ddfcdb0 : dxgmms1!VIDMM_GLOBAL::ReclaimOneAllocation+0x8f
ffffd000`254aa7d0 fffff800`b7e3a256 : ffffc000`0a41bbb8 00000000`00000000 00000000`00000111 ffffd000`254aaaa0 : dxgmms1!VIDMM_GLOBAL::BeginCPUAccess+0x89d
ffffd000`254aa940 fffff800`b7e36dfc : 00000000`00000001 00000000`00000000 ffffd000`254aaa50 ffffc000`0c3212c0 : dxgkrnl!DXGDEVICE::Lock+0x276
ffffd000`254aa9f0 fffff801`8f365263 : 00000000`00c7eac0 ffffc000`000007db ffffc000`052fe000 ffffc000`052fe000 : dxgkrnl!DxgkLock+0x25c
ffffd000`254aab00 00000000`736e519a : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x13
00000000`00c7ea98 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x736e519a
SYMBOL_NAME: dxgmms1!VIDMM_GLOBAL::ReclaimOneAllocation+8f
MODULE_NAME: dxgmms1
IMAGE_NAME: dxgmms1.sys
IMAGE_VERSION: 10.0.10240.16384
STACK_COMMAND: .thread ; .cxr ; kb
BUCKET_ID_FUNC_OFFSET: 8f
FAILURE_BUCKET_ID: AV_R_INVALID_dxgmms1!VIDMM_GLOBAL::ReclaimOneAllocation
OS_VERSION: 10.0.10240.16384
BUILDLAB_STR: th1
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {d8bf8125-05f2-4393-e7f7-5417cbb464ac}
Followup: MachineOwner
---------
IRQL_NOT_LESS_OR_EQUAL (a)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high. This is usually
caused by drivers using improper addresses.
If a kernel debugger is available get the stack backtrace.
Arguments:
Arg1: 0000020000000020, memory referenced
Arg2: 00000000000000ff, IRQL
Arg3: 0000000000000000, bitfield :
bit 0 : value 0 = read operation, 1 = write operation
bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
Arg4: fffff80212604950, address which referenced memory
Debugging Details:
------------------
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 1749
Key : Analysis.DebugAnalysisProvider.CPP
Value: Create: 8007007e on DESKTOP-62N06FT
Key : Analysis.DebugData
Value: CreateObject
Key : Analysis.DebugModel
Value: CreateObject
Key : Analysis.Elapsed.mSec
Value: 13887
Key : Analysis.Memory.CommitPeak.Mb
Value: 66
Key : Analysis.System
Value: CreateObject
Key : WER.OS.Branch
Value: th1
Key : WER.OS.Timestamp
Value: 2015-07-09T17:00:00Z
Key : WER.OS.Version
Value: 10.0.10240.16384
ADDITIONAL_XML: 1
OS_BUILD_LAYERS: 1
BUGCHECK_CODE: a
BUGCHECK_P1: 20000000020
BUGCHECK_P2: ff
BUGCHECK_P3: 0
BUGCHECK_P4: fffff80212604950
READ_ADDRESS: fffff802127d2500: Unable to get MiVisibleState
fffff80212717e80: Unable to get Flags value from nt!KdVersionBlock
0000020000000020
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: System
TRAP_FRAME: ffffd000c5e06a50 -- (.trap 0xffffd000c5e06a50)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=ffffd000c5e06be8 rbx=0000000000000000 rcx=ffffe000cabe0040
rdx=ffffd000c5f81d01 rsi=0000000000000000 rdi=0000000000000000
rip=fffff80212604950 rsp=ffffd000c5e06be8 rbp=0000000000000001
r8=0000020000000000 r9=0000000000000020 r10=0000000000000001
r11=0000000000000102 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up di pl nz na po nc
nt!KiBeginCounterAccumulation+0x20:
fffff802`12604950 498b7820 mov rdi,qword ptr [r8+20h] ds:00000200`00000020=????????????????
Resetting default scope
BAD_STACK_POINTER: ffffd000c5e06908
STACK_TEXT:
ffffd000`c5e06908 fffff802`125655a9 : 00000000`0000000a 00000200`00000020 00000000`000000ff 00000000`00000000 : nt!KeBugCheckEx
ffffd000`c5e06910 fffff802`12563dc8 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiBugCheckDispatch+0x69
ffffd000`c5e06a50 fffff802`12604950 : fffff802`125a8a6e ffffe000`cabe0040 00000000`00000000 ffffe000`cabe0040 : nt!KiPageFault+0x248
ffffd000`c5e06be8 fffff802`125a8a6e : ffffe000`cabe0040 00000000`00000000 ffffe000`cabe0040 ffffd000`c5f7c180 : nt!KiBeginCounterAccumulation+0x20
ffffd000`c5e06bf0 fffff802`1255fc20 : ffffd000`c5f7c180 00000000`00000000 ffffd000`c5f82b40 fffff802`1255d952 : nt! ?? ::FNODOBFM::`string'+0x3f26e
ffffd000`c5e06c20 fffff802`1255da3d : ffffd000`c5f7c180 ffffd000`c5f7c180 ffffd000`c5f88bc0 ffffe000`cbfd84c0 : nt!SwapContext+0x310
ffffd000`c5e06c60 00000000`00000000 : ffffd000`c5e07000 ffffd000`c5e01000 00000000`00000000 00000000`00000000 : nt!KiIdleLoop+0x11d
SYMBOL_NAME: nt!KiBeginCounterAccumulation+20
MODULE_NAME: nt
IMAGE_NAME: ntkrnlmp.exe
IMAGE_VERSION: 10.0.10240.16384
STACK_COMMAND: .thread ; .cxr ; kb
BUCKET_ID_FUNC_OFFSET: 20
FAILURE_BUCKET_ID: AV_STACKPTR_ERROR_nt!KiBeginCounterAccumulation
OS_VERSION: 10.0.10240.16384
BUILDLAB_STR: th1
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {e19fe251-46e0-b6e6-00f0-67f8682bdf94}
Followup: MachineOwner
---------
PAGE_FAULT_IN_NONPAGED_AREA (50)
Invalid system memory was referenced. This cannot be protected by try-except.
Typically the address is just plain bad or it is pointing at freed memory.
Arguments:
Arg1: ffffc20143caf3b0, memory referenced.
Arg2: 0000000000000000, value 0 = read operation, 1 = write operation.
Arg3: fffff80197fa7193, If non-zero, the instruction address which referenced the bad memory
address.
Arg4: 0000000000000002, (reserved)
Debugging Details:
------------------
Could not read faulting driver name
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 1858
Key : Analysis.DebugAnalysisProvider.CPP
Value: Create: 8007007e on DESKTOP-62N06FT
Key : Analysis.DebugData
Value: CreateObject
Key : Analysis.DebugModel
Value: CreateObject
Key : Analysis.Elapsed.mSec
Value: 8539
Key : Analysis.Memory.CommitPeak.Mb
Value: 67
Key : Analysis.System
Value: CreateObject
Key : WER.OS.Branch
Value: th1
Key : WER.OS.Timestamp
Value: 2015-07-09T17:00:00Z
Key : WER.OS.Version
Value: 10.0.10240.16384
ADDITIONAL_XML: 1
OS_BUILD_LAYERS: 1
BUGCHECK_CODE: 50
BUGCHECK_P1: ffffc20143caf3b0
BUGCHECK_P2: 0
BUGCHECK_P3: fffff80197fa7193
BUGCHECK_P4: 2
READ_ADDRESS: fffff803693d0500: Unable to get MiVisibleState
fffff80369315e80: Unable to get Flags value from nt!KdVersionBlock
ffffc20143caf3b0 Paged pool
MM_INTERNAL_CODE: 2
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: System
TRAP_FRAME: ffffd001fd4a6570 -- (.trap 0xffffd001fd4a6570)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=ffffc20143caf390 rbx=0000000000000000 rcx=ffffe00031a78230
rdx=ffffe000319c5890 rsi=0000000000000000 rdi=0000000000000000
rip=fffffa0197fa7193 rsp=ffffd001fd4a6700 rbp=ffffd001fd4a67d1
r8=0000000000000070 r9=0000000000000008 r10=0000000000000008
r11=0000000000000002 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei pl nz na pe nc
fffffa01`97fa7193 ?? ???
Resetting default scope
STACK_TEXT:
ffffd001`fd4a6328 fffff803`691a9bc5 : 00000000`00000050 ffffc201`43caf3b0 00000000`00000000 ffffd001`fd4a6570 : nt!KeBugCheckEx
ffffd001`fd4a6330 fffff803`6902b636 : 00000000`00000000 00000000`00000000 ffffd001`fd4a6570 00000000`00000001 : nt! ?? ::FNODOBFM::`string'+0x423c5
ffffd001`fd4a6420 fffff803`69161cbd : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!MmAccessFault+0x696
ffffd001`fd4a6570 fffffa01`97fa7193 : ffffc001`4d59bf98 ffffc001`4d59bf98 ffffe000`322c1000 ffffe000`31271000 : nt!KiPageFault+0x13d
ffffd001`fd4a6700 ffffc001`4d59bf98 : ffffc001`4d59bf98 ffffe000`322c1000 ffffe000`31271000 ffffe000`31272300 : 0xfffffa01`97fa7193
ffffd001`fd4a6708 ffffc001`4d59bf98 : ffffe000`322c1000 ffffe000`31271000 ffffe000`31272300 ffffe000`31272310 : 0xffffc001`4d59bf98
ffffd001`fd4a6710 ffffe000`322c1000 : ffffe000`31271000 ffffe000`31272300 ffffe000`31272310 ffffd001`fd4a68c0 : 0xffffc001`4d59bf98
ffffd001`fd4a6718 ffffe000`31271000 : ffffe000`31272300 ffffe000`31272310 ffffd001`fd4a68c0 00000000`00000000 : 0xffffe000`322c1000
ffffd001`fd4a6720 ffffe000`31272300 : ffffe000`31272310 ffffd001`fd4a68c0 00000000`00000000 00000000`00000003 : 0xffffe000`31271000
ffffd001`fd4a6728 ffffe000`31272310 : ffffd001`fd4a68c0 00000000`00000000 00000000`00000003 00000000`00000000 : 0xffffe000`31272300
ffffd001`fd4a6730 ffffd001`fd4a68c0 : 00000000`00000000 00000000`00000003 00000000`00000000 ffffe001`00000000 : 0xffffe000`31272310
ffffd001`fd4a6738 00000000`00000000 : 00000000`00000003 00000000`00000000 ffffe001`00000000 000003cc`00000000 : 0xffffd001`fd4a68c0
SYMBOL_NAME: dxgmms1!VIDMM_GLOBAL::PrepareDmaBuffer+1943
MODULE_NAME: dxgmms1
IMAGE_NAME: dxgmms1.sys
IMAGE_VERSION: 10.0.10240.16384
STACK_COMMAND: .thread ; .cxr ; kb
BUCKET_ID_FUNC_OFFSET: 1943
FAILURE_BUCKET_ID: AV_R_INVALID_dxgmms1!VIDMM_GLOBAL::PrepareDmaBuffer
OS_VERSION: 10.0.10240.16384
BUILDLAB_STR: th1
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {25f01a38-57e0-64cb-c7f8-a2f24289c030}
Followup: MachineOwner
---------
PAGE_FAULT_IN_NONPAGED_AREA (50)
Invalid system memory was referenced. This cannot be protected by try-except.
Typically the address is just plain bad or it is pointing at freed memory.
Arguments:
Arg1: ffffc200ff3d0350, memory referenced.
Arg2: 0000000000000000, value 0 = read operation, 1 = write operation.
Arg3: fffff80149567193, If non-zero, the instruction address which referenced the bad memory
address.
Arg4: 0000000000000002, (reserved)
Debugging Details:
------------------
Could not read faulting driver name
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 1796
Key : Analysis.DebugAnalysisProvider.CPP
Value: Create: 8007007e on DESKTOP-62N06FT
Key : Analysis.DebugData
Value: CreateObject
Key : Analysis.DebugModel
Value: CreateObject
Key : Analysis.Elapsed.mSec
Value: 12201
Key : Analysis.Memory.CommitPeak.Mb
Value: 67
Key : Analysis.System
Value: CreateObject
Key : WER.OS.Branch
Value: th1
Key : WER.OS.Timestamp
Value: 2015-07-09T17:00:00Z
Key : WER.OS.Version
Value: 10.0.10240.16384
ADDITIONAL_XML: 1
OS_BUILD_LAYERS: 1
BUGCHECK_CODE: 50
BUGCHECK_P1: ffffc200ff3d0350
BUGCHECK_P2: 0
BUGCHECK_P3: fffff80149567193
BUGCHECK_P4: 2
READ_ADDRESS: fffff8012a038500: Unable to get MiVisibleState
fffff80129f7de80: Unable to get Flags value from nt!KdVersionBlock
ffffc200ff3d0350 Paged pool
MM_INTERNAL_CODE: 2
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: System
TRAP_FRAME: ffffd001dcd6e570 -- (.trap 0xffffd001dcd6e570)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=ffffc200ff3d0330 rbx=0000000000000000 rcx=ffffe001a6745ab0
rdx=ffffe001a0980a40 rsi=0000000000000000 rdi=0000000000000000
rip=fffff80149567193 rsp=ffffd001dcd6e700 rbp=ffffd001dcd6e7d1
r8=0000000000000070 r9=0000000000000008 r10=0000000000000008
r11=0000000000000002 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei pl nz na pe nc
dxgmms1!VIDMM_GLOBAL::PrepareDmaBuffer+0x1943:
fffff801`49567193 4c034020 add r8,qword ptr [rax+20h] ds:ffffc200`ff3d0350=????????????????
Resetting default scope
STACK_TEXT:
ffffd001`dcd6e328 fffff801`29e11bc5 : 00000000`00000050 ffffc200`ff3d0350 00000000`00000000 ffffd001`dcd6e570 : nt!KeBugCheckEx
ffffd001`dcd6e330 fffff801`29c93636 : 00000000`00000000 00000000`00000000 ffffd001`dcd6e570 00000000`00000000 : nt! ?? ::FNODOBFM::`string'+0x423c5
ffffd001`dcd6e420 fffff801`29dc9cbd : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!MmAccessFault+0x696
ffffd001`dcd6e570 fffff801`49567193 : ffffc001`01eebf98 ffffc001`01eebf98 ffffe001`a53c7000 ffffe001`a53ed000 : nt!KiPageFault+0x13d
ffffd001`dcd6e700 fffff801`4955e007 : ffffe001`00000000 ffffc000`ff3d0330 00000000`00000000 ffffe001`a68c65f0 : dxgmms1!VIDMM_GLOBAL::PrepareDmaBuffer+0x1943
ffffd001`dcd6e820 fffff801`49577f12 : ffffe001`a46f87c0 ffffe001`00000000 ffffe001`00000000 ffffe001`00000003 : dxgmms1!VidSchiSubmitRenderCommand+0x1e7
ffffd001`dcd6eb70 fffff801`49577e5d : ffffe001`a53f3000 00000000`00000080 ffffe001`a018b780 ffffe001`a018b700 : dxgmms1!VidSchiRun_PriorityTable+0xb2
ffffd001`dcd6ebc0 fffff801`29d596d8 : ffffe001`a018b780 ffffd001`dcd6ec90 ffffd001`daa40180 fffff801`29dc5c30 : dxgmms1!VidSchiWorkerThread+0x8d
ffffd001`dcd6ec00 fffff801`29dc5d06 : ffffd001`daa40180 ffffe001`a019c080 ffffd001`daa4cbc0 00000000`00000000 : nt!PspSystemThreadStartup+0x58
ffffd001`dcd6ec60 00000000`00000000 : ffffd001`dcd6f000 ffffd001`dcd69000 00000000`00000000 00000000`00000000 : nt!KiStartSystemThread+0x16
SYMBOL_NAME: dxgmms1!VIDMM_GLOBAL::PrepareDmaBuffer+1943
MODULE_NAME: dxgmms1
IMAGE_NAME: dxgmms1.sys
IMAGE_VERSION: 10.0.10240.16384
STACK_COMMAND: .thread ; .cxr ; kb
BUCKET_ID_FUNC_OFFSET: 1943
FAILURE_BUCKET_ID: AV_R_INVALID_dxgmms1!VIDMM_GLOBAL::PrepareDmaBuffer
OS_VERSION: 10.0.10240.16384
BUILDLAB_STR: th1
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {25f01a38-57e0-64cb-c7f8-a2f24289c030}
Followup: MachineOwner
---------
IRQL_NOT_LESS_OR_EQUAL (a)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high. This is usually
caused by drivers using improper addresses.
If a kernel debugger is available get the stack backtrace.
Arguments:
Arg1: ffffe20159624570, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000000, bitfield :
bit 0 : value 0 = read operation, 1 = write operation
bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
Arg4: fffff80014adab48, address which referenced memory
Debugging Details:
------------------
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 1780
Key : Analysis.DebugAnalysisProvider.CPP
Value: Create: 8007007e on DESKTOP-62N06FT
Key : Analysis.DebugData
Value: CreateObject
Key : Analysis.DebugModel
Value: CreateObject
Key : Analysis.Elapsed.mSec
Value: 8635
Key : Analysis.Memory.CommitPeak.Mb
Value: 78
Key : Analysis.System
Value: CreateObject
Key : WER.OS.Branch
Value: th1
Key : WER.OS.Timestamp
Value: 2015-07-09T17:00:00Z
Key : WER.OS.Version
Value: 10.0.10240.16384
ADDITIONAL_XML: 1
OS_BUILD_LAYERS: 1
BUGCHECK_CODE: a
BUGCHECK_P1: ffffe20159624570
BUGCHECK_P2: 2
BUGCHECK_P3: 0
BUGCHECK_P4: fffff80014adab48
READ_ADDRESS: fffff80014e54500: Unable to get MiVisibleState
fffff80014d99e80: Unable to get Flags value from nt!KdVersionBlock
ffffe20159624570 Nonpaged pool
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: csrss.exe
IRP_ADDRESS: ffffffffffffff88
TRAP_FRAME: ffffd000213ed3c0 -- (.trap 0xffffd000213ed3c0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=ffffe20159624570 rbx=0000000000000000 rcx=ffffe0015e1381a8
rdx=ffffe20159624570 rsi=0000000000000000 rdi=0000000000000000
rip=fffff80014adab48 rsp=ffffd000213ed550 rbp=ffffd000213ed698
r8=0000000000000000 r9=0000000000000002 r10=ffffd0011277d120
r11=0000000000000001 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei pl nz na po nc
nt!IopCompleteRequest+0xf78:
fffff800`14adab48 488b00 mov rax,qword ptr [rax] ds:ffffe201`59624570=????????????????
Resetting default scope
STACK_TEXT:
ffffd000`213ed278 fffff800`14be75a9 : 00000000`0000000a ffffe201`59624570 00000000`00000002 00000000`00000000 : nt!KeBugCheckEx
ffffd000`213ed280 fffff800`14be5dc8 : 00000000`00000000 00000000`00000200 00000000`00000010 ffffe001`5db391a0 : nt!KiBugCheckDispatch+0x69
ffffd000`213ed3c0 fffff800`14adab48 : 00000000`00000000 00000000`00000000 00000000`00000005 00000000`00000000 : nt!KiPageFault+0x248
ffffd000`213ed550 fffff800`14ad1656 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!IopCompleteRequest+0xf78
ffffd000`213ed650 fffff800`14ad5496 : ffffe001`5db29080 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiDeliverApc+0x136
ffffd000`213ed6d0 fffff800`14ad4be8 : 00000018`1c7909b2 ffffe001`5db29080 00000000`00000000 00000000`00000001 : nt!KiSwapThread+0x426
ffffd000`213ed780 fffff800`14ad40d9 : ffffe001`5db2f9b0 00000000`0000000a 00000000`00000000 00000000`00000000 : nt!KiCommitThreadWait+0x148
ffffd000`213ed810 fffff960`ed064e2e : fffff901`0000000a ffffe001`5db2f9b0 fffff901`401a40a0 fffff800`0000000d : nt!KeWaitForMultipleObjects+0x229
ffffd000`213ed8d0 fffff960`ed12fed1 : ffffe001`5d9ad2d0 00000000`00000001 00000000`00000001 ffffe001`5d9ad2d0 : win32kfull!xxxDesktopThreadWaiter+0x14e
ffffd000`213ed960 fffff960`ed413d55 : 00000000`00000001 00000000`00000001 00000000`00000003 00000000`00000001 : win32kfull!xxxDesktopThread+0x4f1
ffffd000`213eda90 fffff960`ed0f59fd : 00000000`00000001 fffff960`ed497ab0 00000000`00000004 00000000`00000000 : win32kbase!xxxCreateSystemThreads+0x85
ffffd000`213edad0 fffff800`14be7263 : ffffe001`5db29080 00000000`00000004 000000ee`315097d8 000000ee`31504c50 : win32kfull!NtUserCallNoParam+0x2d
ffffd000`213edb00 00007ffd`6fd37a5a : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x13
000000ee`320ffc78 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffd`6fd37a5a
SYMBOL_NAME: win32kfull!xxxDesktopThreadWaiter+14e
MODULE_NAME: win32kfull
IMAGE_NAME: win32kfull.sys
IMAGE_VERSION: 10.0.10240.16384
STACK_COMMAND: .thread ; .cxr ; kb
BUCKET_ID_FUNC_OFFSET: 14e
FAILURE_BUCKET_ID: AV_win32kfull!xxxDesktopThreadWaiter
OS_VERSION: 10.0.10240.16384
BUILDLAB_STR: th1
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {0143e876-c439-d336-acae-d9f6d2868b4e}
Followup: MachineOwner
---------
PAGE_FAULT_IN_NONPAGED_AREA (50)
Invalid system memory was referenced. This cannot be protected by try-except.
Typically the address is just plain bad or it is pointing at freed memory.
Arguments:
Arg1: ffffe200e29d1eb0, memory referenced.
Arg2: 0000000000000002, value 0 = read operation, 1 = write operation.
Arg3: fffff803c7c52e72, If non-zero, the instruction address which referenced the bad memory
address.
Arg4: 0000000000000002, (reserved)
Debugging Details:
------------------
Could not read faulting driver name
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 1811
Key : Analysis.DebugAnalysisProvider.CPP
Value: Create: 8007007e on DESKTOP-62N06FT
Key : Analysis.DebugData
Value: CreateObject
Key : Analysis.DebugModel
Value: CreateObject
Key : Analysis.Elapsed.mSec
Value: 9764
Key : Analysis.Memory.CommitPeak.Mb
Value: 72
Key : Analysis.System
Value: CreateObject
Key : WER.OS.Branch
Value: th1
Key : WER.OS.Timestamp
Value: 2015-07-09T17:00:00Z
Key : WER.OS.Version
Value: 10.0.10240.16384
ADDITIONAL_XML: 1
OS_BUILD_LAYERS: 1
BUGCHECK_CODE: 50
BUGCHECK_P1: ffffe200e29d1eb0
BUGCHECK_P2: 2
BUGCHECK_P3: fffff803c7c52e72
BUGCHECK_P4: 2
READ_ADDRESS: fffff803c7fe1500: Unable to get MiVisibleState
fffff803c7f26e80: Unable to get Flags value from nt!KdVersionBlock
ffffe200e29d1eb0 Nonpaged pool
MM_INTERNAL_CODE: 2
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: sedsvc.exe
DEVICE_OBJECT: 0000000000000408
TRAP_FRAME: ffffd0002036fba0 -- (.trap 0xffffd0002036fba0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000001 rbx=0000000000000000 rcx=0000000000000007
rdx=0000000000000200 rsi=0000000000000000 rdi=0000000000000000
rip=fffff803c7c52e72 rsp=ffffd0002036fd30 rbp=ffffd0002036fe30
r8=00000000ffffffff r9=0000098000000000 r10=00000000ffffffff
r11=7ff0000000000000 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei pl nz na pe nc
nt!MmCheckCachedPageStates+0x732:
fffff803`c7c52e72 898bb0060000 mov dword ptr [rbx+6B0h],ecx ds:00000000`000006b0=????????
Resetting default scope
STACK_TEXT:
ffffd000`2036f958 fffff803`c7dbabc5 : 00000000`00000050 ffffe200`e29d1eb0 00000000`00000002 ffffd000`2036fba0 : nt!KeBugCheckEx
ffffd000`2036f960 fffff803`c7c3c636 : 00000000`00000002 00000000`00000000 ffffd000`2036fba0 ffffe000`00000000 : nt! ?? ::FNODOBFM::`string'+0x423c5
ffffd000`2036fa50 fffff803`c7d72cbd : ffffb001`53b00000 ffff7a78`307e060b 00000000`00000000 00000000`00000000 : nt!MmAccessFault+0x696
ffffd000`2036fba0 fffff803`c7c52e72 : 00000000`000000a0 ffffe000`e29d1800 ffffe000`e4bdb3f0 ffffd000`2036fe48 : nt!KiPageFault+0x13d
ffffd000`2036fd30 fffff803`c7c52655 : ffffe000`e29fa9b0 00000000`00000001 ffffe000`dfb123c0 00000000`00001000 : nt!MmCheckCachedPageStates+0x732
ffffd000`2036fed0 fffff803`c80307e7 : ffffc000`00000000 00000000`00000000 ffffd000`2036ff01 00000000`00000001 : nt!CcMapAndRead+0xe5
ffffd000`2036ff30 fffff801`d26cb29c : ffffe000`dfca1cd8 ffffc000`53c87938 00000000`00001000 ffffc000`00040000 : nt!CcMapData+0x97
ffffd000`2036ffa0 fffff801`d26cac8f : ffffe000`e67c9978 ffffc000`53c87930 ffffb001`507c3658 ffffe000`00000000 : NTFS!ReadIndexBuffer+0xdc
ffffd000`20370050 fffff801`d26d0e05 : ffffc000`57633b40 ffffd000`20370150 00000000`00000000 ffffb001`507c3658 : NTFS!FindFirstIndexEntry+0x17f
ffffd000`20370100 fffff801`d26cdb28 : ffffc000`57633e08 ffffc000`57633b40 ffffe000`e6901bb0 00000000`0000002a : NTFS!NtfsRestartIndexEnumeration+0x145
ffffd000`20370390 fffff801`d26cfc63 : 00000000`00000000 ffffe000`e29fecb0 ffffd000`203708c0 00000000`00000000 : NTFS!NtfsQueryDirectory+0xb68
ffffd000`20370770 fffff801`d26cfda7 : 00000000`00000000 ffffe000`e6901810 ffffe000`e6901801 ffffd000`203708c0 : NTFS!NtfsCommonDirectoryControl+0xa3
ffffd000`203707b0 fffff801`d1df51c4 : ffffe000`e6901810 ffffe000`e6901810 ffffe000`e67c9978 ffffd000`203707d8 : NTFS!NtfsFsdDirectoryControl+0xb7
ffffd000`20370820 fffff801`d1df3a16 : ffffe000`dfbb5e40 ffffd000`20370b80 00000000`00000401 ffffe000`e128e400 : FLTMGR!FltpLegacyProcessingAfterPreCallbacksCompleted+0x2a4
ffffd000`203708a0 fffff803`c803d72b : 00000000`00000002 ffffd000`20370981 ffffe000`e68e6850 ffffe000`e68e6804 : FLTMGR!FltpDispatch+0xb6
ffffd000`20370900 fffff803`c803c0ef : 00000000`00000408 00000000`00000000 00000000`00000000 ffffe000`e29d1800 : nt!IopSynchronousServiceTail+0x16b
ffffd000`203709d0 fffff803`c7d74263 : ffffc000`53861780 fffff803`c803e05d fffff803`c84bb1e0 ffffd000`20370b80 : nt!NtQueryDirectoryFile+0xcf
ffffd000`20370a90 00007fff`a275389a : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x13
0000006e`df58c4c8 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007fff`a275389a
SYMBOL_NAME: nt!MmCheckCachedPageStates+732
MODULE_NAME: nt
IMAGE_VERSION: 10.0.10240.16384
STACK_COMMAND: .thread ; .cxr ; kb
IMAGE_NAME: ntkrnlmp.exe
BUCKET_ID_FUNC_OFFSET: 732
FAILURE_BUCKET_ID: AV_INVALID_nt!MmCheckCachedPageStates
OS_VERSION: 10.0.10240.16384
BUILDLAB_STR: th1
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {c23772ba-b187-2947-9bda-16ca1f251011}
Followup: MachineOwner
---------
MEMORY_MANAGEMENT (1a)
# Any other values for parameter 1 must be individually examined.
Arguments:
Arg1: 0000000000041289, The subtype of the bugcheck.
Arg2: 00007fffc1f6b000
Arg3: 00000000000059f1
Arg4: 00007dffc1f6b205
Debugging Details:
------------------
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 1718
Key : Analysis.DebugAnalysisProvider.CPP
Value: Create: 8007007e on DESKTOP-62N06FT
Key : Analysis.DebugData
Value: CreateObject
Key : Analysis.DebugModel
Value: CreateObject
Key : Analysis.Elapsed.mSec
Value: 8448
Key : Analysis.Memory.CommitPeak.Mb
Value: 66
Key : Analysis.System
Value: CreateObject
Key : WER.OS.Branch
Value: th1
Key : WER.OS.Timestamp
Value: 2015-07-09T17:00:00Z
Key : WER.OS.Version
Value: 10.0.10240.16384
ADDITIONAL_XML: 1
OS_BUILD_LAYERS: 1
BUGCHECK_CODE: 1a
BUGCHECK_P1: 41289
BUGCHECK_P2: 7fffc1f6b000
BUGCHECK_P3: 59f1
BUGCHECK_P4: 7dffc1f6b205
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: chrome.exe
STACK_TEXT:
ffffd000`21e29628 fffff802`d53944de : 00000000`0000001a 00000000`00041289 00007fff`c1f6b000 00000000`000059f1 : nt!KeBugCheckEx
ffffd000`21e29630 fffff802`d526cdd6 : ffff0000`00000000 ffffe000`acede578 ffffe000`b106ee00 00000000`000021bd : nt! ?? ::FNODOBFM::`string'+0x21cde
ffffd000`21e29690 fffff802`d523d506 : fffffa80`016b9b70 fffff802`d52f9921 fffff6bf`ffe0f9c0 fffff802`d524e02a : nt!MiLocateWsle+0x16
ffffd000`21e296f0 fffff802`d523f837 : 00000000`0000003a 1f100000`652a8025 00000000`00000000 fffff6bf`ffe0f9c0 : nt!MiGetPageProtection+0x106
ffffd000`21e29740 fffff802`d523f319 : ffffe000`acede080 00000000`00000000 00000000`00000000 00000000`00000118 : nt!MiQueryAddressState+0x307
ffffd000`21e29840 fffff802`d5620178 : 00000000`00000003 00000007`00000003 00007fff`c1f6b000 00007fff`bfc9f000 : nt!MiQueryAddressSpan+0x139
ffffd000`21e298d0 fffff802`d561fb1d : 00000000`00000000 00000000`00000080 00000000`00000000 00000000`00000000 : nt!MmQueryVirtualMemory+0x648
ffffd000`21e29a40 fffff802`d536e263 : fffff6fb`40128860 fffff680`2510c550 ffffc9b2`60ed292b 0000004a`2737f208 : nt!NtQueryVirtualMemory+0x25
ffffd000`21e29a90 00007fff`e346377a : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x13
0000004a`2737e8c8 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007fff`e346377a
SYMBOL_NAME: nt! ?? ::FNODOBFM::`string'+21cde
MODULE_NAME: nt
IMAGE_NAME: ntkrnlmp.exe
IMAGE_VERSION: 10.0.10240.16384
STACK_COMMAND: .thread ; .cxr ; kb
BUCKET_ID_FUNC_OFFSET: 21cde
FAILURE_BUCKET_ID: 0x1a_41289_nt!_??_::FNODOBFM::_string_
OS_VERSION: 10.0.10240.16384
BUILDLAB_STR: th1
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {e01cf37e-0b3f-17aa-251b-4e0e5b8f0b0f}
Followup: MachineOwner
---------