*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
PAGE_FAULT_IN_NONPAGED_AREA (50)
Invalid system memory was referenced. This cannot be protected by try-except.
Typically the address is just plain bad or it is pointing at freed memory.
Arguments:
Arg1: ffffa9405d6bf558, memory referenced.
Arg2: 0000000000000000, X64: bit 0 set if the fault was due to a not-present PTE.
bit 1 is set if the fault was due to a write, clear if a read.
bit 3 is set if the processor decided the fault was due to a corrupted PTE.
bit 4 is set if the fault was due to attempted execute of a no-execute PTE.
- ARM64: bit 1 is set if the fault was due to a write, clear if a read.
bit 3 is set if the fault was due to attempted execute of a no-execute PTE.
Arg3: fffff8064be57804, If non-zero, the instruction address which referenced the bad memory
address.
Arg4: 0000000000000002, (reserved)
Debugging Details:
------------------
KEY_VALUES_STRING: 1
Key : AV.Type
Value: Read
Key : Analysis.CPU.mSec
Value: 1499
Key : Analysis.Elapsed.mSec
Value: 4078
Key : Analysis.IO.Other.Mb
Value: 0
Key : Analysis.IO.Read.Mb
Value: 0
Key : Analysis.IO.Write.Mb
Value: 0
Key : Analysis.Init.CPU.mSec
Value: 187
Key : Analysis.Init.Elapsed.mSec
Value: 9793
Key : Analysis.Memory.CommitPeak.Mb
Value: 137
Key : Bugcheck.Code.LegacyAPI
Value: 0x50
Key : Failure.Bucket
Value: AV_R_(null)_nt!ExpAllocateHandleTableEntry
Key : Failure.Hash
Value: {057ca722-8246-3c91-57a3-2501ef38bce9}
Key : WER.OS.Branch
Value: vb_release
Key : WER.OS.Version
Value: 10.0.19041.1
BUGCHECK_CODE: 50
BUGCHECK_P1: ffffa9405d6bf558
BUGCHECK_P2: 0
BUGCHECK_P3: fffff8064be57804
BUGCHECK_P4: 2
FILE_IN_CAB: 060423-7359-01.dmp.dmp
READ_ADDRESS: fffff8064c4fb390: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
unable to get nt!MmSpecialPagesInUse
ffffa9405d6bf558
MM_INTERNAL_CODE: 2
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: StartMenuExperienceHost.exe
TRAP_FRAME: ffffa202b34474a0 -- (.trap 0xffffa202b34474a0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000000 rbx=0000000000000000 rcx=ffff920b731832c0
rdx=ffffa9005aec5b40 rsi=0000000000000000 rdi=0000000000000000
rip=fffff8064be57804 rsp=ffffa202b3447630 rbp=0000000000000008
r8=ffffa202b3447640 r9=0000000000000000 r10=0000000000000000
r11=ffffa900619914b6 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei ng nz na po nc
nt!ExpAllocateHandleTableEntry+0xe4:
fffff806`4be57804 498b4708 mov rax,qword ptr [r15+8] ds:00000000`00000008=????????????????
Resetting default scope
STACK_TEXT:
ffffa202`b34471f8 fffff806`4bc4af53 : 00000000`00000050 ffffa940`5d6bf558 00000000`00000000 ffffa202`b34474a0 : nt!KeBugCheckEx
ffffa202`b3447200 fffff806`4ba6e7b0 : 00000000`00000000 00000000`00000000 ffffa202`b3447520 00000000`00000000 : nt!MiSystemFault+0x1b2563
ffffa202`b3447300 fffff806`4bc0bad8 : ffffa900`619d4030 ffffa202`b34476a0 ffffa900`5d606980 ffffa202`b34477f0 : nt!MmAccessFault+0x400
ffffa202`b34474a0 fffff806`4be57804 : ffffa900`5aec5b40 00000000`00000001 00000000`00000000 00000000`00000006 : nt!KiPageFault+0x358
ffffa202`b3447630 fffff806`4be576a8 : 00000000`00000400 00000000`00000000 ffffa900`5aec5b00 ffff920b`731832c0 : nt!ExpAllocateHandleTableEntry+0xe4
ffffa202`b3447680 fffff806`4becebd6 : 00000000`00000000 00000000`00000000 ffffa202`b3447ac0 ffff920b`00000000 : nt!ExCreateHandleEx+0x78
ffffa202`b34476d0 fffff806`4ba33d8c : 00000000`00000000 ffffa900`61991450 00000000`00000000 0000004f`c8cfd1d0 : nt!RtlpInsertStringAtom+0x2a
ffffa202`b3447710 fffff806`4bec4034 : ffffa900`5aed6630 00000000`00000026 0000004f`c8cfd1c0 0000004f`c8cfd1c0 : nt!RtlAddAtomToAtomTableEx+0x13c
ffffa202`b34477b0 fffff806`4bc0f7f5 : ffff920b`731832c0 000001ea`75350000 ffffa202`b3447ac0 ffff920b`730a3080 : nt!NtAddAtomEx+0x124
ffffa202`b3447a40 00007fff`0a98ddc4 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x25
0000004f`c8cfd118 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007fff`0a98ddc4
SYMBOL_NAME: nt!ExpAllocateHandleTableEntry+e4
MODULE_NAME: nt
IMAGE_NAME: ntkrnlmp.exe
IMAGE_VERSION: 10.0.19041.3031
STACK_COMMAND: .cxr; .ecxr ; kb
BUCKET_ID_FUNC_OFFSET: e4
FAILURE_BUCKET_ID: AV_R_(null)_nt!ExpAllocateHandleTableEntry
OS_VERSION: 10.0.19041.1
BUILDLAB_STR: vb_release
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {057ca722-8246-3c91-57a3-2501ef38bce9}
Followup: MachineOwner
---------
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
DRIVER_IRQL_NOT_LESS_OR_EQUAL (d1)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high. This is usually
caused by drivers using improper addresses.
If kernel debugger is available get stack backtrace.
Arguments:
Arg1: ffffffffffffff9f, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000000, value 0 = read operation, 1 = write operation
Arg4: fffff8059da8cda6, address which referenced memory
Debugging Details:
------------------
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 1531
Key : Analysis.Elapsed.mSec
Value: 4122
Key : Analysis.IO.Other.Mb
Value: 0
Key : Analysis.IO.Read.Mb
Value: 0
Key : Analysis.IO.Write.Mb
Value: 0
Key : Analysis.Init.CPU.mSec
Value: 187
Key : Analysis.Init.Elapsed.mSec
Value: 22410
Key : Analysis.Memory.CommitPeak.Mb
Value: 154
Key : Bugcheck.Code.LegacyAPI
Value: 0xd1
Key : Failure.Bucket
Value: AV_dxgmms2!VidSchiProfilePerformanceTick
Key : Failure.Hash
Value: {cb0b1289-fb87-52e2-f284-4f9f64401311}
Key : WER.OS.Branch
Value: vb_release
Key : WER.OS.Version
Value: 10.0.19041.1
BUGCHECK_CODE: d1
BUGCHECK_P1: ffffffffffffff9f
BUGCHECK_P2: 2
BUGCHECK_P3: 0
BUGCHECK_P4: fffff8059da8cda6
FILE_IN_CAB: 060423-7125-01.dmp.dmp
READ_ADDRESS: fffff805650fb390: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
unable to get nt!MmSpecialPagesInUse
ffffffffffffff9f
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: VALORANT-Win64-Shipping.exe
TRAP_FRAME: ffff8806cca8a1e0 -- (.trap 0xffff8806cca8a1e0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000000 rbx=0000000000000000 rcx=3e2f5f2515890000
rdx=000000000000000e rsi=0000000000000000 rdi=0000000000000000
rip=fffff8059da8cda6 rsp=ffff8806cca8a370 rbp=0000000000000000
r8=ffff8806cca89ee0 r9=0000000000000000 r10=0000000000000000
r11=fffff8059dab2680 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei ng nz na po nc
dxgmms2!VidSchiProfilePerformanceTick+0x12926:
fffff805`9da8cda6 4c8b559f mov r10,qword ptr [rbp-61h] ss:0018:ffffffff`ffffff9f=????????????????
Resetting default scope
STACK_TEXT:
ffff8806`cca8a098 fffff805`64810029 : 00000000`0000000a ffffffff`ffffff9f 00000000`00000002 00000000`00000000 : nt!KeBugCheckEx
ffff8806`cca8a0a0 fffff805`6480bbe3 : 00000000`00000000 fffff805`9da93d62 00000000`00000000 fffff805`7f2cd5cf : nt!KiBugCheckDispatch+0x69
ffff8806`cca8a1e0 fffff805`9da8cda6 : ffffca03`bd5b9000 00000000`00000001 ffff8806`cca8a418 ffffca03`c5f5a240 : nt!KiPageFault+0x463
ffff8806`cca8a370 fffff805`9daabf1c : ffffca03`c2bfc630 ffff8806`cca8a4b4 ffffca03`c693f010 ffffca03`bd5b9000 : dxgmms2!VidSchiProfilePerformanceTick+0x12926
ffff8806`cca8a490 fffff805`9daaa0ca : ffffca03`c693f010 ffffca03`bd561000 ffffca03`c693f120 ffffca03`c2d99010 : dxgmms2!VidSchiSubmitCommandPacketToHwQueue+0xc8
ffff8806`cca8a510 fffff805`7f4fee0c : 00000000`00000000 00000000`00000000 00000000`08000000 ffffca03`c2d99010 : dxgmms2!VidSchSubmitCommandToHwQueue+0x2da
ffff8806`cca8a570 fffff805`7f501c6a : ffff8806`cca8aac0 ffff8806`cca8a908 ffff8806`cca8a908 ffff8806`cca8a941 : dxgkrnl!DXGHWQUEUE::SubmitCommand+0x5d4
ffff8806`cca8a880 fffff805`7f5018db : 000000a6`79ccfa80 ffffca03`c4ace080 00000000`00000000 00000000`00000000 : dxgkrnl!DxgkSubmitCommandToHwQueueInternal+0x382
ffff8806`cca8aa10 fffff805`6480ff9a : ffffca03`c4ace080 ffffca03`c36e82e0 00000000`00000000 00000000`00000000 : dxgkrnl!DxgkSubmitCommandToHwQueue+0xb
ffff8806`cca8aa40 00007ffc`aa5e5b04 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceExitPico+0x3ef
000000a6`79ccf9e8 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffc`aa5e5b04
SYMBOL_NAME: dxgmms2!VidSchiProfilePerformanceTick+12926
MODULE_NAME: dxgmms2
IMAGE_NAME: dxgmms2.sys
IMAGE_VERSION: 10.0.19041.2965
STACK_COMMAND: .cxr; .ecxr ; kb
BUCKET_ID_FUNC_OFFSET: 12926
FAILURE_BUCKET_ID: AV_dxgmms2!VidSchiProfilePerformanceTick
OS_VERSION: 10.0.19041.1
BUILDLAB_STR: vb_release
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {cb0b1289-fb87-52e2-f284-4f9f64401311}
Followup: MachineOwner
---------
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
PAGE_FAULT_IN_NONPAGED_AREA (50)
Invalid system memory was referenced. This cannot be protected by try-except.
Typically the address is just plain bad or it is pointing at freed memory.
Arguments:
Arg1: ffffa40d609a1378, memory referenced.
Arg2: 0000000000000000, X64: bit 0 set if the fault was due to a not-present PTE.
bit 1 is set if the fault was due to a write, clear if a read.
bit 3 is set if the processor decided the fault was due to a corrupted PTE.
bit 4 is set if the fault was due to attempted execute of a no-execute PTE.
- ARM64: bit 1 is set if the fault was due to a write, clear if a read.
bit 3 is set if the fault was due to attempted execute of a no-execute PTE.
Arg3: fffff804e473220b, If non-zero, the instruction address which referenced the bad memory
address.
Arg4: 0000000000000002, (reserved)
Debugging Details:
------------------
KEY_VALUES_STRING: 1
Key : AV.Type
Value: Read
Key : Analysis.CPU.mSec
Value: 1437
Key : Analysis.Elapsed.mSec
Value: 3899
Key : Analysis.IO.Other.Mb
Value: 0
Key : Analysis.IO.Read.Mb
Value: 0
Key : Analysis.IO.Write.Mb
Value: 0
Key : Analysis.Init.CPU.mSec
Value: 171
Key : Analysis.Init.Elapsed.mSec
Value: 13946
Key : Analysis.Memory.CommitPeak.Mb
Value: 134
Key : Bugcheck.Code.LegacyAPI
Value: 0x50
Key : Failure.Bucket
Value: AV_R_(null)_WdNisDrv!unknown_function
Key : Failure.Hash
Value: {277a463a-5282-a91c-e1d6-c17eaf8303e7}
Key : WER.OS.Branch
Value: vb_release
Key : WER.OS.Version
Value: 10.0.19041.1
BUGCHECK_CODE: 50
BUGCHECK_P1: ffffa40d609a1378
BUGCHECK_P2: 0
BUGCHECK_P3: fffff804e473220b
BUGCHECK_P4: 2
FILE_IN_CAB: 060423-7390-01.dmp.dmp
READ_ADDRESS: fffff8046d2fb390: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
unable to get nt!MmSpecialPagesInUse
ffffa40d609a1378
MM_INTERNAL_CODE: 2
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXPNP: 1 (!blackboxpnp)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: svchost.exe
TRAP_FRAME: ffffb58d5332d980 -- (.trap 0xffffb58d5332d980)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=ffffa40f5feb8480 rbx=0000000000000000 rcx=0000000000000136
rdx=0000000000000000 rsi=0000000000000000 rdi=0000000000000000
rip=fffff804e473220b rsp=ffffb58d5332db10 rbp=ffffb58d5332dc60
r8=ffffb58d5332db80 r9=0000000000000108 r10=ffffa40d609a1350
r11=0000000000000000 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei ng nz na pe nc
WdNisDrv+0x220b:
fffff804`e473220b 418b7a28 mov edi,dword ptr [r10+28h] ds:ffffa40d`609a1378=????????
Resetting default scope
STACK_TEXT:
ffffb58d`5332d6d8 fffff804`6ca4af53 : 00000000`00000050 ffffa40d`609a1378 00000000`00000000 ffffb58d`5332d980 : nt!KeBugCheckEx
ffffb58d`5332d6e0 fffff804`6c86e7b0 : 00000000`00000008 00000000`00000000 ffffb58d`5332da00 00000000`00000000 : nt!MiSystemFault+0x1b2563
ffffb58d`5332d7e0 fffff804`6ca0bad8 : ffffa40f`627dc790 ffffa40f`627dc790 ffffa40f`627d020c 00000000`00000000 : nt!MmAccessFault+0x400
ffffb58d`5332d980 fffff804`e473220b : ffffb58d`5332db98 ffffb58d`5332db90 00000000`00000000 00000000`00000000 : nt!KiPageFault+0x358
ffffb58d`5332db10 ffffb58d`5332db98 : ffffb58d`5332db90 00000000`00000000 00000000`00000000 00000000`00000000 : WdNisDrv+0x220b
ffffb58d`5332db18 ffffb58d`5332db90 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000001 : 0xffffb58d`5332db98
ffffb58d`5332db20 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000001 ffffa40f`627d020c : 0xffffb58d`5332db90
SYMBOL_NAME: WdNisDrv+220b
MODULE_NAME: WdNisDrv
IMAGE_NAME: WdNisDrv.sys
STACK_COMMAND: .cxr; .ecxr ; kb
BUCKET_ID_FUNC_OFFSET: 220b
FAILURE_BUCKET_ID: AV_R_(null)_WdNisDrv!unknown_function
OS_VERSION: 10.0.19041.1
BUILDLAB_STR: vb_release
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {277a463a-5282-a91c-e1d6-c17eaf8303e7}
Followup: MachineOwner
---------
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
IRQL_NOT_LESS_OR_EQUAL (a)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high. This is usually
caused by drivers using improper addresses.
If a kernel debugger is available get the stack backtrace.
Arguments:
Arg1: ffffc40a62bc92b0, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000000, bitfield :
bit 0 : value 0 = read operation, 1 = write operation
bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
Arg4: fffff8021f6b4694, address which referenced memory
Debugging Details:
------------------
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 1593
Key : Analysis.Elapsed.mSec
Value: 3467
Key : Analysis.IO.Other.Mb
Value: 0
Key : Analysis.IO.Read.Mb
Value: 0
Key : Analysis.IO.Write.Mb
Value: 0
Key : Analysis.Init.CPU.mSec
Value: 186
Key : Analysis.Init.Elapsed.mSec
Value: 11339
Key : Analysis.Memory.CommitPeak.Mb
Value: 145
Key : Bugcheck.Code.LegacyAPI
Value: 0xa
Key : Failure.Bucket
Value: AV_nt!MiGetPageProtection
Key : Failure.Hash
Value: {41372a35-237d-1281-82f6-8f5f9bf6044a}
Key : WER.OS.Branch
Value: vb_release
Key : WER.OS.Version
Value: 10.0.19041.1
BUGCHECK_CODE: a
BUGCHECK_P1: ffffc40a62bc92b0
BUGCHECK_P2: 2
BUGCHECK_P3: 0
BUGCHECK_P4: fffff8021f6b4694
FILE_IN_CAB: 060223-7812-01.dmp.dmp
READ_ADDRESS: fffff802200fb390: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
unable to get nt!MmSpecialPagesInUse
ffffc40a62bc92b0
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXPNP: 1 (!blackboxpnp)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: WmiPrvSE.exe
TRAP_FRAME: ffffec854bb872f0 -- (.trap 0xffffec854bb872f0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=ffffc40a62bc92b0 rbx=0000000000000000 rcx=00000000ffffffff
rdx=00000000000003ff rsi=0000000000000000 rdi=0000000000000000
rip=fffff8021f6b4694 rsp=ffffec854bb87480 rbp=0000000000000000
r8=ffffec854bb87558 r9=ffffec854bb87554 r10=fffff77bbddee7f8
r11=fffff77bbddee000 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei pl nz na po nc
nt!MiGetPageProtection+0x4d4:
fffff802`1f6b4694 488b08 mov rcx,qword ptr [rax] ds:ffffc40a`62bc92b0=????????????????
Resetting default scope
STACK_TEXT:
ffffec85`4bb871a8 fffff802`1f810029 : 00000000`0000000a ffffc40a`62bc92b0 00000000`00000002 00000000`00000000 : nt!KeBugCheckEx
ffffec85`4bb871b0 fffff802`1f80bbe3 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiBugCheckDispatch+0x69
ffffec85`4bb872f0 fffff802`1f6b4694 : 0000007f`fffffff8 00000000`00000000 ffff8802`e740e038 00000000`00000000 : nt!KiPageFault+0x463
ffffec85`4bb87480 fffff802`1f6b3005 : 00000000`00000000 00000000`00000000 ffffec85`4bb87558 ffffec85`4bb87554 : nt!MiGetPageProtection+0x4d4
ffffec85`4bb87500 fffff802`1f62c2bf : 00000000`00000000 0000024f`76e60000 c40263f5`b050ff4d 00000000`00001400 : nt!MiQueryAddressState+0x4b5
ffffec85`4bb87710 fffff802`1fa22a6c : ffffec85`4bb80000 00000000`00000000 ffffc402`00000000 ffffc402`00000000 : nt!MiQueryAddressSpan+0xcf
ffffec85`4bb877d0 fffff802`1fa22215 : ffffeb03`b6b8ca6c 00000000`00000000 00000192`99f5e7c0 00000000`00001634 : nt!MmQueryVirtualMemory+0x83c
ffffec85`4bb87980 fffff802`1f80f7f5 : 00000000`00000000 00000192`99f5e7b8 00000000`00000000 00000000`00000000 : nt!NtQueryVirtualMemory+0x25
ffffec85`4bb879d0 00007fff`60e8d514 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x25
0000004c`6197d3e8 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007fff`60e8d514
SYMBOL_NAME: nt!MiGetPageProtection+4d4
MODULE_NAME: nt
IMAGE_VERSION: 10.0.19041.3031
STACK_COMMAND: .cxr; .ecxr ; kb
IMAGE_NAME: ntkrnlmp.exe
BUCKET_ID_FUNC_OFFSET: 4d4
FAILURE_BUCKET_ID: AV_nt!MiGetPageProtection
OS_VERSION: 10.0.19041.1
BUILDLAB_STR: vb_release
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {41372a35-237d-1281-82f6-8f5f9bf6044a}
Followup: MachineOwner
---------
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
SYSTEM_SERVICE_EXCEPTION (3b)
An exception happened while executing a system service routine.
Arguments:
Arg1: 00000000c0000005, Exception code that caused the BugCheck
Arg2: fffff8006c063d37, Address of the instruction which caused the BugCheck
Arg3: ffffc686ae06e1b0, Address of the context record for the exception that caused the BugCheck
Arg4: 0000000000000000, zero.
Debugging Details:
------------------
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 1530
Key : Analysis.Elapsed.mSec
Value: 5004
Key : Analysis.IO.Other.Mb
Value: 0
Key : Analysis.IO.Read.Mb
Value: 0
Key : Analysis.IO.Write.Mb
Value: 0
Key : Analysis.Init.CPU.mSec
Value: 202
Key : Analysis.Init.Elapsed.mSec
Value: 12901
Key : Analysis.Memory.CommitPeak.Mb
Value: 154
Key : Bugcheck.Code.LegacyAPI
Value: 0x3b
Key : Failure.Bucket
Value: AV_dxgmms2!McGenEventWrite_EtwWriteTransfer
Key : Failure.Hash
Value: {5f66c0bb-d30c-22d8-775d-3fe51eb41150}
Key : WER.OS.Branch
Value: vb_release
Key : WER.OS.Version
Value: 10.0.19041.1
BUGCHECK_CODE: 3b
BUGCHECK_P1: c0000005
BUGCHECK_P2: fffff8006c063d37
BUGCHECK_P3: ffffc686ae06e1b0
BUGCHECK_P4: 0
FILE_IN_CAB: 060123-7531-01.dmp.dmp
CONTEXT: ffffc686ae06e1b0 -- (.cxr 0xffffc686ae06e1b0)
rax=0000000000000002 rbx=0000000000000000 rcx=ffff908ad6514310
rdx=fffff8006c082d50 rsi=0000000000000004 rdi=ffff908a83ca2520
rip=fffff8006c063d37 rsp=ffffc686ae06ebb0 rbp=ffffc686ae06ec59
r8=ffffc686ae06ec20 r9=0000000000000006 r10=0000000000002df4
r11=0000000000000006 r12=0000000000000000 r13=0000000000160000
r14=ffff908a83ca2548 r15=0000000000160000
iopl=0 nv up ei pl nz na pe nc
cs=0010 ss=0018 ds=002b es=002b fs=0053 gs=002b efl=00050202
dxgmms2!McGenEventWrite_EtwWriteTransfer+0x27:
fffff800`6c063d37 450fb70a movzx r9d,word ptr [r10] ds:002b:00000000`00002df4=????
Resetting default scope
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXPNP: 1 (!blackboxpnp)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: VALORANT-Win64-Shipping.exe
STACK_TEXT:
ffffc686`ae06ebb0 fffff800`6c067e27 : 00000000`00000000 ffffc686`ae06fa40 00000000`00000004 00000000`00802000 : dxgmms2!McGenEventWrite_EtwWriteTransfer+0x27
ffffc686`ae06ebf0 fffff800`6c0d6b20 : ffff908a`83ca2520 00000000`00010001 00000000`00000004 0000020b`a7d20000 : dxgmms2!McTemplateK0pxqqt_EtwWriteTransfer+0x8b
ffffc686`ae06eca0 fffff800`6c0a0292 : ffffc686`ae06edf0 00000000`02000000 ffff908a`83ca2520 fffff800`6c063d62 : dxgmms2!VIDMM_RECYCLE_BLOCK::Allocate+0x36860
ffffc686`ae06ed00 fffff800`6c0a05da : 00000000`00000000 00000000`00010000 ffffe084`dd3ac978 ffffe084`dd3ac920 : dxgmms2!VIDMM_RECYCLE_HEAP::CreateBlockForType+0x66
ffffc686`ae06ed30 fffff800`6c0a1fa8 : 00000000`00000000 00000000`00010000 00000000`00000001 ffffc686`0000001c : dxgmms2!VIDMM_RECYCLE_HEAP::CreateBlockAndRange+0x42
ffffc686`ae06eda0 fffff800`6c0a1d87 : ffffe084`dd3ac978 00000000`00160000 00000000`00000001 ffffc686`ae06ef70 : dxgmms2!VIDMM_RECYCLE_HEAP::Allocate+0x128
ffffc686`ae06ee70 fffff800`6c0ba1c8 : ffffe084`ce010300 00000000`00000000 ffffe084`ce013900 00000000`00000002 : dxgmms2!VIDMM_RECYCLE_HEAP_MGR::Allocate+0x127
ffffc686`ae06ef00 fffff800`6c0b9b36 : 00000000`00000001 00000000`33306956 00000000`00000000 00000000`00000000 : dxgmms2!VIDMM_GLOBAL::CommitLocalBackingStore+0x498
ffffc686`ae06f000 fffff800`6c0b91fd : ffffe084`e2e87490 00000000`00000002 ffffb600`00000000 ffff908a`db8f0010 : dxgmms2!VIDMM_GLOBAL::OpenLocalAllocation+0x116
ffffc686`ae06f0c0 fffff800`6c0b8d96 : ffffc686`ae06f388 ffffe084`e39adbd0 ffff908a`db8f0010 00000000`00000000 : dxgmms2!VIDMM_GLOBAL::OpenOneAllocation+0x42d
ffffc686`ae06f240 fffff800`6c052523 : 00000000`00000000 00000000`01001002 00000000`00000000 ffffc686`00000005 : dxgmms2!VIDMM_GLOBAL::OpenAllocation+0x52
ffffc686`ae06f290 fffff800`4e55067e : 00000000`00000000 fffff692`9fee79ff ffff908a`851055c0 00000000`00000000 : dxgmms2!VidMmOpenAllocation+0x53
ffffc686`ae06f2f0 fffff800`4e4f3a9e : 00000000`00000000 ffffc686`ae06f830 ffff908a`80598860 ffff908a`80598b30 : dxgkrnl!DXGDEVICE::CreateVidMmAllocations+0x8ee
ffffc686`ae06f400 fffff800`4e4f01f3 : ffffe084`d8b96c30 ffffc686`ae06fac0 00000000`00000000 ffff908a`88d2a820 : dxgkrnl!DXGDEVICE::CreateAllocation+0x124e
ffffc686`ae06f770 fffff800`4e5574ed : ffffe084`ddac0f34 00000000`00501802 ffffe084`ddac35c0 00000000`00000001 : dxgkrnl!DxgkCreateAllocationInternal+0xbd3
ffffc686`ae06fa00 fffff800`3440ff9a : ffffe084`ddac35c0 ffffe084`e2cc5260 00000000`00000000 00000000`00000000 : dxgkrnl!DxgkCreateAllocation+0xd
ffffc686`ae06fa40 00007ff8`f7d94784 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceExitPico+0x3ef
000000ea`f2bdb258 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ff8`f7d94784
SYMBOL_NAME: dxgmms2!McGenEventWrite_EtwWriteTransfer+27
MODULE_NAME: dxgmms2
IMAGE_NAME: dxgmms2.sys
IMAGE_VERSION: 10.0.19041.2965
STACK_COMMAND: .cxr 0xffffc686ae06e1b0 ; kb
BUCKET_ID_FUNC_OFFSET: 27
FAILURE_BUCKET_ID: AV_dxgmms2!McGenEventWrite_EtwWriteTransfer
OS_VERSION: 10.0.19041.1
BUILDLAB_STR: vb_release
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {5f66c0bb-d30c-22d8-775d-3fe51eb41150}
Followup: MachineOwner
---------