MEMORY_MANAGEMENT (1a)
# Any other values for parameter 1 must be individually examined.
Arguments:
Arg1: 0000000000005002, The subtype of the bugcheck.
Arg2: fffff70001080000
Arg3: 000000000000377a
Arg4: 0100377bfffffffe
Debugging Details:
------------------
fffff800034360e8: Unable to get Flags value from nt!KdVersionBlock
GetUlongPtrFromAddress: unable to read from fffff800034f1300
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 1999
Key : Analysis.DebugAnalysisProvider.CPP
Value: Create: 8007007e on DESKTOP-62N06FT
Key : Analysis.DebugData
Value: CreateObject
Key : Analysis.DebugModel
Value: CreateObject
Key : Analysis.Elapsed.mSec
Value: 30461
Key : Analysis.Memory.CommitPeak.Mb
Value: 64
Key : Analysis.System
Value: CreateObject
Key : WER.OS.Branch
Value: win7sp1_ldr_escrow
Key : WER.OS.Timestamp
Value: 2020-01-02T17:07:00Z
Key : WER.OS.Version
Value: 7.1.7601.24545
ADDITIONAL_XML: 1
OS_BUILD_LAYERS: 1
BUGCHECK_CODE: 1a
BUGCHECK_P1: 5002
BUGCHECK_P2: fffff70001080000
BUGCHECK_P3: 377a
BUGCHECK_P4: 100377bfffffffe
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: AvastSvc.exe
STACK_TEXT:
fffff880`0899b798 fffff800`032bc806 : 00000000`0000001a 00000000`00005002 fffff700`01080000 00000000`0000377a : nt!KeBugCheckEx
fffff880`0899b7a0 fffff800`033b369c : 00000000`00000000 00000000`1d4a0429 00000000`00000000 0000000f`ffffffff : nt!MiAllocateWsle+0xf6
fffff880`0899b800 fffff800`033b46a7 : 00000000`00000000 00000000`00000000 fffff683`ff7bbd68 fffffa80`0ca213f8 : nt!MiResolveTransitionFault+0xa8c
fffff880`0899b8a0 fffff800`033c3720 : ffffffff`ffffffff 00000000`1d4a0429 00000000`002f7cda ffffffff`ffffffff : nt!MiDispatchFault+0x807
fffff880`0899b990 fffff800`032f3fdc : 00000000`00000000 00000000`1d4a0429 fffffa80`00000001 00000000`1d4a0410 : nt!MmAccessFault+0x4090
fffff880`0899bae0 000007fe`f77ad3bb : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiPageFault+0x35c
00000000`14a6f180 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x000007fe`f77ad3bb
SYMBOL_NAME: nt!MiAllocateWsle+f6
MODULE_NAME: nt
IMAGE_VERSION: 6.1.7601.24545
STACK_COMMAND: .thread ; .cxr ; kb
IMAGE_NAME: ntkrnlmp.exe
FAILURE_BUCKET_ID: 0x1a_5002_nt!MiAllocateWsle+f6
OS_VERSION: 7.1.7601.24545
BUILDLAB_STR: win7sp1_ldr_escrow
OSPLATFORM_TYPE: x64
OSNAME: Windows 7
FAILURE_ID_HASH: {223dd223-4827-3ef4-6738-3401270c6c70}
Followup: MachineOwner
---------
VIDEO_TDR_FAILURE (116)
Attempt to reset the display driver and recover from timeout failed.
Arguments:
Arg1: fffffa800b1104e0, Optional pointer to internal TDR recovery context (TDR_RECOVERY_CONTEXT).
Arg2: fffff88004b2899c, The pointer into responsible device driver module (e.g. owner tag).
Arg3: 0000000000000000, Optional error code (NTSTATUS) of the last failed operation.
Arg4: 0000000000000002, Optional internal context dependent data.
Debugging Details:
------------------
Unable to load image \SystemRoot\system32\DRIVERS\atikmpag.sys, Win32 error 0n2
*** WARNING: Unable to verify timestamp for atikmpag.sys
fffff800033e50e8: Unable to get Flags value from nt!KdVersionBlock
GetUlongPtrFromAddress: unable to read from fffff800034a0300
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 1812
Key : Analysis.DebugAnalysisProvider.CPP
Value: Create: 8007007e on DESKTOP-62N06FT
Key : Analysis.DebugData
Value: CreateObject
Key : Analysis.DebugModel
Value: CreateObject
Key : Analysis.Elapsed.mSec
Value: 12277
Key : Analysis.Memory.CommitPeak.Mb
Value: 64
Key : Analysis.System
Value: CreateObject
Key : WER.OS.Branch
Value: win7sp1_ldr_escrow
Key : WER.OS.Timestamp
Value: 2020-01-02T17:07:00Z
Key : WER.OS.Version
Value: 7.1.7601.24545
ADDITIONAL_XML: 1
OS_BUILD_LAYERS: 1
BUGCHECK_CODE: 116
BUGCHECK_P1: fffffa800b1104e0
BUGCHECK_P2: fffff88004b2899c
BUGCHECK_P3: 0
BUGCHECK_P4: 2
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: System
STACK_TEXT:
fffff880`06fe4888 fffff880`04ca53f0 : 00000000`00000116 fffffa80`0b1104e0 fffff880`04b2899c 00000000`00000000 : nt!KeBugCheckEx
fffff880`06fe4890 fffff880`04ca50fa : fffff880`04b2899c fffffa80`0b1104e0 fffffa80`0b2bbc00 fffffa80`0b086410 : dxgkrnl!TdrBugcheckOnTimeout+0xec
fffff880`06fe48d0 fffff880`04d4cfef : fffffa80`0b1104e0 00000000`00000000 fffffa80`0b2bbc00 fffffa80`0b086410 : dxgkrnl!TdrIsRecoveryRequired+0x1a2
fffff880`06fe4900 fffff880`04d76dc9 : 00000000`ffffffff 00000000`0000045d 00000000`00000000 00000000`00000002 : dxgmms1!VidSchiReportHwHang+0x40b
fffff880`06fe49e0 fffff880`04d7550f : 00000000`00000102 00000000`0000000a 00000000`0000045d 00000000`00000000 : dxgmms1!VidSchiCheckHwProgress+0x71
fffff880`06fe4a10 fffff880`04d48306 : ffffffff`ff676980 fffffa80`0b086410 00000000`00000000 00000000`00000000 : dxgmms1!VidSchiWaitForSchedulerEvents+0x1fb
fffff880`06fe4ab0 fffff880`04d750ce : 00000000`00000000 00000000`0000000f 00000000`00000080 fffffa80`0b02cc58 : dxgmms1!VidSchiScheduleCommandToRun+0x1da
fffff880`06fe4bc0 fffff800`035422e8 : fffffa80`0c3512b0 fffff880`02fe0180 00000000`00000001 fffffa80`0a922e20 : dxgmms1!VidSchiWorkerThread+0xba
fffff880`06fe4c00 fffff800`0329cec6 : fffff880`02fe0180 fffffa80`0c437b50 fffff880`02fef140 00000000`00000000 : nt!PspSystemThreadStartup+0x194
fffff880`06fe4c40 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiStartSystemThread+0x16
SYMBOL_NAME: atikmpag+f99c
MODULE_NAME: atikmpag
IMAGE_NAME: atikmpag.sys
STACK_COMMAND: .thread ; .cxr ; kb
FAILURE_BUCKET_ID: 0x116_IMAGE_atikmpag.sys
OS_VERSION: 7.1.7601.24545
BUILDLAB_STR: win7sp1_ldr_escrow
OSPLATFORM_TYPE: x64
OSNAME: Windows 7
FAILURE_ID_HASH: {e300aa8c-6915-3f37-7957-d2e4fc30a6fd}
Followup: MachineOwner
---------
MEMORY_MANAGEMENT (1a)
# Any other values for parameter 1 must be individually examined.
Arguments:
Arg1: 0000000000041790, A page table page has been corrupted. On a 64 bit OS, parameter 2
contains the address of the PFN for the corrupted page table page.
On a 32 bit OS, parameter 2 contains a pointer to the number of used
PTEs, and parameter 3 contains the number of used PTEs.
Arg2: fffffa8006aec420
Arg3: 000000000000ffff
Arg4: 0000000000000000
Debugging Details:
------------------
fffff800034000e8: Unable to get Flags value from nt!KdVersionBlock
GetUlongPtrFromAddress: unable to read from fffff800034bb300
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 1796
Key : Analysis.DebugAnalysisProvider.CPP
Value: Create: 8007007e on DESKTOP-62N06FT
Key : Analysis.DebugData
Value: CreateObject
Key : Analysis.DebugModel
Value: CreateObject
Key : Analysis.Elapsed.mSec
Value: 10116
Key : Analysis.Memory.CommitPeak.Mb
Value: 78
Key : Analysis.System
Value: CreateObject
Key : WER.OS.Branch
Value: win7sp1_ldr_escrow
Key : WER.OS.Timestamp
Value: 2020-01-02T17:07:00Z
Key : WER.OS.Version
Value: 7.1.7601.24545
ADDITIONAL_XML: 1
OS_BUILD_LAYERS: 1
BUGCHECK_CODE: 1a
BUGCHECK_P1: 41790
BUGCHECK_P2: fffffa8006aec420
BUGCHECK_P3: ffff
BUGCHECK_P4: 0
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: Zoom.exe
STACK_TEXT:
fffff880`0ce96728 fffff800`0337624d : 00000000`0000001a 00000000`00041790 fffffa80`06aec420 00000000`0000ffff : nt!KeBugCheckEx
fffff880`0ce96730 fffff800`03393835 : fffff880`00000000 00000000`26cc0fff 00000017`00000000 01000000`00000000 : nt!MiDeleteVirtualAddresses+0x93d
fffff880`0ce968a0 fffff800`03513571 : fffffa80`0e805b00 00000000`00000000 00000000`00000000 00000000`26cc0fff : nt!MiRemoveMappedView+0x485
fffff880`0ce969e0 fffff960`0010773d : fffff900`00000001 fffffa80`0b658690 fffff900`00000001 fffff960`001fb100 : nt!MiUnmapViewOfSection+0x1b1
fffff880`0ce96aa0 fffff960`0020175f : 00000000`00000000 fffff900`c1e0b9c0 fffff900`c00cb0f0 fffff880`0ce96b80 : win32k!SURFACE::Map+0x175
fffff880`0ce96af0 fffff960`00201829 : fffff880`0ce96b78 fffff880`0ce97068 00000000`00000001 fffff880`0ce96d20 : win32k!vSpPIDLockSpriteArea+0x4f
fffff880`0ce96b20 fffff960`0008dad2 : 00000000`00000000 fffff880`0ce97068 fffff880`0ce96d40 000002d8`00000556 : win32k!PIDLOCKSPRITEAREA::vLock+0x4d
fffff880`0ce96b50 fffff960`00204a13 : 00000000`00000000 00000000`00000000 00000000`0000cccc fffff900`c2c2c018 : win32k!ENUMUNDERLAYS::bEnum+0x27a
fffff880`0ce96c70 fffff960`00204a7c : fffff900`c2c2c018 ffffffc1`fffffb9c 00000000`00000000 fffff880`0ce96ed8 : win32k!SpBitBlt+0x843
fffff880`0ce97060 fffff960`00258343 : 00000000`00000000 fffff900`c1ce8440 fffff900`c0000de0 fffff900`c1ce8440 : win32k!SpCopyBits+0x44
fffff880`0ce970d0 fffff960`001ec658 : 00000000`030117b0 00000000`00000000 00000000`00000000 00000000`2c011638 : win32k!NtGdiBitBltInternal+0xc9b
fffff880`0ce972b0 fffff880`04d045c9 : fffff8a0`1c215000 000002c2`00000556 fffff8a0`1b4d34e0 fffff8a0`06d4c440 : win32k!DxgkEngBltViaGDI+0x588
fffff880`0ce97420 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : dxgkrnl!DXGCONTEXT::Present+0x2d5d
SYMBOL_NAME: dxgkrnl!DXGCONTEXT::Present+2d5d
MODULE_NAME: dxgkrnl
IMAGE_NAME: dxgkrnl.sys
IMAGE_VERSION: 6.1.7601.24513
STACK_COMMAND: .thread ; .cxr ; kb
FAILURE_BUCKET_ID: 0x1a_41790_dxgkrnl!DXGCONTEXT::Present+2d5d
OS_VERSION: 7.1.7601.24545
BUILDLAB_STR: win7sp1_ldr_escrow
OSPLATFORM_TYPE: x64
OSNAME: Windows 7
FAILURE_ID_HASH: {2e1d914e-7f25-3aa9-35aa-b81a92dfb503}
Followup: MachineOwner
---------
NTFS_FILE_SYSTEM (24)
If you see NtfsExceptionFilter on the stack then the 2nd and 3rd
parameters are the exception record and context record. Do a .cxr
on the 3rd parameter and then kb to obtain a more informative stack
trace.
Arguments:
Arg1: 00000000000c08a5
Arg2: 0000000000000000
Arg3: 0000000000000000
Arg4: 0000000000000000
Debugging Details:
------------------
fffff800037f30e8: Unable to get Flags value from nt!KdVersionBlock
GetUlongPtrFromAddress: unable to read from fffff800038ae300
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 1765
Key : Analysis.DebugAnalysisProvider.CPP
Value: Create: 8007007e on DESKTOP-62N06FT
Key : Analysis.DebugData
Value: CreateObject
Key : Analysis.DebugModel
Value: CreateObject
Key : Analysis.Elapsed.mSec
Value: 24029
Key : Analysis.Memory.CommitPeak.Mb
Value: 71
Key : Analysis.System
Value: CreateObject
Key : WER.OS.Branch
Value: win7sp1_ldr_escrow
Key : WER.OS.Timestamp
Value: 2020-01-02T17:07:00Z
Key : WER.OS.Version
Value: 7.1.7601.24545
ADDITIONAL_XML: 1
OS_BUILD_LAYERS: 1
BUGCHECK_CODE: 24
BUGCHECK_P1: c08a5
BUGCHECK_P2: 0
BUGCHECK_P3: 0
BUGCHECK_P4: 0
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: opera.exe
TRAP_FRAME: fffff8800b1c7380 -- (.trap 0xfffff8800b1c7380)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000000 rbx=0000000000000000 rcx=0000000000000000
rdx=0000000000000000 rsi=0000000000000000 rdi=0000000000000000
rip=fffff800036386e3 rsp=fffff8800b1c7510 rbp=0000000000000001
r8=fffffa800f856068 r9=000000000b0c7000 r10=fffffa80101feb00
r11=0000000000000400 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei ng nz na po cy
nt!MmProbeAndLockPages+0x643:
fffff800`036386e3 410fb601 movzx eax,byte ptr [r9] ds:00000000`0b0c7000=??
Resetting default scope
STACK_TEXT:
fffff880`0b1c6e18 fffff880`01246c25 : 00000000`00000024 00000000`000c08a5 00000000`00000000 00000000`00000000 : nt!KeBugCheckEx
fffff880`0b1c6e20 fffff880`0126b225 : 00000000`00000000 00000000`00000000 fffffa80`0a7a09c0 00000010`00000000 : Ntfs!NtfsPagingFileIo+0x155
fffff880`0b1c6f20 fffff880`0105683f : fffffa80`0cda3500 fffffa80`0cda3160 fffffa80`0a0e8570 00000000`00000000 : Ntfs! ?? ::FNODOBFM::`string'+0x6289
fffff880`0b1c6fd0 fffff880`010556df : fffffa80`0a9589e0 fffffa80`10212650 fffffa80`0cda3100 fffffa80`0cda3160 : fltmgr!FltpLegacyProcessingAfterPreCallbacksCompleted+0x24f
fffff880`0b1c7060 fffff800`03652292 : fffffa80`0cda3160 fffffa80`102125e0 fffffa80`0a9589e0 fffff880`009e5180 : fltmgr!FltpDispatch+0xcf
fffff880`0b1c70c0 fffff800`03779ea3 : fffff680`00058600 fffff680`00058600 fffffa80`102125e0 fffff8a0`053a5080 : nt!IoPageRead+0x2a2
fffff880`0b1c7150 fffff800`037811fb : ffffffff`ffffffff 00000000`00000000 00000000`c0033333 ffffffff`ffffffff : nt!MiIssueHardFault+0x363
fffff880`0b1c7230 fffff800`036b0fdc : 00000000`00000000 00000000`0b0c7000 fffff8a0`053a5000 ffffffff`ffffffff : nt!MmAccessFault+0x4b6b
fffff880`0b1c7380 fffff800`036386e3 : 00000000`00000000 00000000`00002040 fffff880`0b1c7608 fffff800`00000002 : nt!KiPageFault+0x35c
fffff880`0b1c7510 fffff880`04a33c85 : fffffa80`0f856000 00000000`00000000 fffff8a0`00000002 00000000`0b0c0000 : nt!MmProbeAndLockPages+0x643
fffff880`0b1c7620 fffff880`04a32df1 : fffffa80`0c6106b0 fffff8a0`14ab1e50 00000000`00000048 00000000`00400000 : dxgmms1!VIDMM_SEGMENT::SafeProbeAndLockPages+0x229
fffff880`0b1c76b0 fffff880`04a2d8bc : fffff8a0`14ab1e50 fffff8a0`14ab1e50 00000000`00000000 00000000`00000000 : dxgmms1!VIDMM_SEGMENT::LockAllocationBackingStore+0x8d
fffff880`0b1c7720 fffff880`04a21cd3 : fffffa80`0b0c7650 fffffa80`0cacf000 fffffa80`0cacf000 fffff880`04a218c8 : dxgmms1!VIDMM_APERTURE_SEGMENT::CommitResource+0x1c4
fffff880`0b1c7770 fffff880`04a1e931 : 00000000`00000000 fffffa80`0ebd9000 00000000`00000000 fffffa80`0d9067a0 : dxgmms1!VIDMM_GLOBAL::PageInAllocations+0xbb
fffff880`0b1c77d0 fffff880`04a388b1 : 00000000`00000000 fffff8a0`0effce40 fffffa80`00000000 fffffa80`10c38710 : dxgmms1!VIDMM_GLOBAL::PrepareDmaBuffer+0xcdd
fffff880`0b1c79a0 fffff880`04a385ec : fffff880`04a38014 00000000`00000000 fffffa80`00000000 fffffa80`00000000 : dxgmms1!VidSchiSubmitRenderCommand+0x241
fffff880`0b1c7b90 fffff880`04a380ea : 00000000`00000000 fffffa80`105ccb10 00000000`00000080 fffffa80`0c2f8010 : dxgmms1!VidSchiSubmitQueueCommand+0x50
fffff880`0b1c7bc0 fffff800`039502e8 : 00000000`00000000 fffff880`02f65180 00000000`00000001 00000000`00000000 : dxgmms1!VidSchiWorkerThread+0xd6
fffff880`0b1c7c00 fffff800`036aaec6 : fffff880`02f65180 fffffa80`0c612040 fffff880`02f74140 00000000`00000000 : nt!PspSystemThreadStartup+0x194
fffff880`0b1c7c40 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiStartSystemThread+0x16
SYMBOL_NAME: dxgmms1!VIDMM_SEGMENT::SafeProbeAndLockPages+229
MODULE_NAME: dxgmms1
IMAGE_NAME: dxgmms1.sys
IMAGE_VERSION: 6.1.7601.24513
STACK_COMMAND: .thread ; .cxr ; kb
FAILURE_BUCKET_ID: 0x24_dxgmms1!VIDMM_SEGMENT::SafeProbeAndLockPages+229
OS_VERSION: 7.1.7601.24545
BUILDLAB_STR: win7sp1_ldr_escrow
OSPLATFORM_TYPE: x64
OSNAME: Windows 7
FAILURE_ID_HASH: {e6475d31-924b-c65e-2344-6c50bfeb4e3d}
Followup: MachineOwner
---------