PAGE_FAULT_IN_NONPAGED_AREA (50)
Invalid system memory was referenced. This cannot be protected by try-except.
Typically the address is just plain bad or it is pointing at freed memory.
Arguments:
Arg1: fffff87fcb2a8a50, memory referenced.
Arg2: 0000000000000000, value 0 = read operation, 1 = write operation.
Arg3: fffff880042b1aba, If non-zero, the instruction address which referenced the bad memory
address.
Arg4: 0000000000000005, (reserved)
Debugging Details:
------------------
Could not read faulting driver name
fffff80002e450e8: Unable to get Flags value from nt!KdVersionBlock
GetUlongPtrFromAddress: unable to read from fffff80002f00300
KEY_VALUES_STRING: 1
Key : Analysis.CPU.Sec
Value: 2
Key : Analysis.DebugAnalysisProvider.CPP
Value: Create: 8007007e on DESKTOP-0141DB3
Key : Analysis.DebugData
Value: CreateObject
Key : Analysis.DebugModel
Value: CreateObject
Key : Analysis.Elapsed.Sec
Value: 2
Key : Analysis.Memory.CommitPeak.Mb
Value: 63
Key : Analysis.System
Value: CreateObject
ADDITIONAL_XML: 1
BUGCHECK_CODE: 50
BUGCHECK_P1: fffff87fcb2a8a50
BUGCHECK_P2: 0
BUGCHECK_P3: fffff880042b1aba
BUGCHECK_P4: 5
READ_ADDRESS: fffff80002e450e8: Unable to get Flags value from nt!KdVersionBlock
fffff80002e450e8: Unable to get Flags value from nt!KdVersionBlock
fffff80002e450e8: Unable to get Flags value from nt!KdVersionBlock
Unable to get MmSystemRangeStart
GetUlongPtrFromAddress: unable to read from fffff80002f002f0
GetUlongPtrFromAddress: unable to read from fffff80002f004a8
fffff87fcb2a8a50
MM_INTERNAL_CODE: 5
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: dwm.exe
TRAP_FRAME: fffff8800384b6d0 -- (.trap 0xfffff8800384b6d0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=fffffa8004d2dba0 rbx=0000000000000000 rcx=fffffa8004d2db50
rdx=fffffa80037ba110 rsi=0000000000000000 rdi=0000000000000000
rip=fffff880042b1aba rsp=fffff8800384b860 rbp=fffff8800384bca0
r8=00000000000d38c4 r9=0000000000000009 r10=0000000000000000
r11=fffff88002a90120 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei ng nz na pe nc
dxgkrnl!DxgkEscape+0x1d6:
fffff880`042b1aba 44843d8f6fffff test byte ptr [dxgkrnl!g_loggerInfo+0x8 (fffff880`042a8a50)],r15b ds:fffff880`042a8a50=??
Resetting default scope
STACK_TEXT:
fffff880`0384b578 fffff800`02dcedc6 : 00000000`00000050 fffff87f`cb2a8a50 00000000`00000000 fffff880`0384b6d0 : nt!KeBugCheckEx
fffff880`0384b580 fffff800`02d02fdc : 00000000`00000000 fffff87f`cb2a8a50 00000000`00000000 00000000`00000000 : nt!MmAccessFault+0x736
fffff880`0384b6d0 fffff880`042b1aba : 00000000`000007e4 00000000`00000000 fffff880`0384bca0 00000000`00000003 : nt!KiPageFault+0x35c
fffff880`0384b860 fffff960`001de542 : 00000000`03c4e580 fffffa80`04d2db50 00000000`00000000 00000000`00000000 : dxgkrnl!DxgkEscape+0x1d6
fffff880`0384bbf0 fffff800`02d04f53 : fffffa80`04d2db50 00000000`03c4f6a0 000007fe`f8b0c610 00000000`00000000 : win32k!EngUnlockDirectDrawSurface+0x3056
fffff880`0384bc20 000007fe`fd4513ea : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x13
00000000`03c4e868 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x000007fe`fd4513ea
SYMBOL_NAME: dxgkrnl!DxgkEscape+1d6
MODULE_NAME: dxgkrnl
IMAGE_NAME: dxgkrnl.sys
IMAGE_VERSION: 6.1.7601.24513
STACK_COMMAND: .thread ; .cxr ; kb
FAILURE_BUCKET_ID: X64_0x50_dxgkrnl!DxgkEscape+1d6
OS_VERSION: 7.1.7601.24545
BUILDLAB_STR: win7sp1_ldr_escrow
OSPLATFORM_TYPE: x64
OSNAME: Windows 7
FAILURE_ID_HASH: {22d8b951-7e4f-3f6e-509c-ff499041f173}
Followup: MachineOwner
SYSTEM_SERVICE_EXCEPTION (3b)
An exception happened while executing a system service routine.
Arguments:
Arg1: 00000000c0000005, Exception code that caused the bugcheck
Arg2: fffff80002e259cf, Address of the instruction which caused the bugcheck
Arg3: fffff88005250940, Address of the context record for the exception that caused the bugcheck
Arg4: 0000000000000000, zero.
Debugging Details:
------------------
fffff80002e2d0e8: Unable to get Flags value from nt!KdVersionBlock
GetUlongPtrFromAddress: unable to read from fffff80002ee8300
KEY_VALUES_STRING: 1
Key : Analysis.CPU.Sec
Value: 2
Key : Analysis.DebugAnalysisProvider.CPP
Value: Create: 8007007e on DESKTOP-0141DB3
Key : Analysis.DebugData
Value: CreateObject
Key : Analysis.DebugModel
Value: CreateObject
Key : Analysis.Elapsed.Sec
Value: 2
Key : Analysis.Memory.CommitPeak.Mb
Value: 58
Key : Analysis.System
Value: CreateObject
ADDITIONAL_XML: 1
BUGCHECK_CODE: 3b
BUGCHECK_P1: c0000005
BUGCHECK_P2: fffff80002e259cf
BUGCHECK_P3: fffff88005250940
BUGCHECK_P4: 0
CONTEXT: fffff88005250940 -- (.cxr 0xfffff88005250940)
rax=0000000000000000 rbx=0000000000000000 rcx=fffff88002c8de30
rdx=fffff900c1c54000 rsi=0000000000000000 rdi=fffff900c06f1960
rip=fffff80002e259cf rsp=fffff88005251310 rbp=0000000000000000
r8=fffff900c1dd0310 r9=fffff900c1c53f00 r10=0000000000000001
r11=fffff900c1c53f10 r12=fffff88002c8dcc0 r13=0000000000000000
r14=0000000000000006 r15=0000000000000001
iopl=0 nv up ei ng nz ac po cy
cs=0010 ss=0018 ds=002b es=002b fs=0053 gs=002b efl=00010297
nt!ExDeferredFreePool+0x1df:
fffff800`02e259cf 4c395808 cmp qword ptr [rax+8],r11 ds:002b:00000000`00000008=????????????????
Resetting default scope
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: explorer.exe
STACK_TEXT:
fffff880`05251310 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!ExDeferredFreePool+0x1df
SYMBOL_NAME: nt!ExDeferredFreePool+1df
IMAGE_NAME: Pool_Corruption
IMAGE_VERSION: 6.1.7601.24545
MODULE_NAME: Pool_Corruption
STACK_COMMAND: .cxr 0xfffff88005250940 ; kb
FAILURE_BUCKET_ID: X64_0x3B_c0000005_nt!ExDeferredFreePool+1df
OS_VERSION: 7.1.7601.24545
BUILDLAB_STR: win7sp1_ldr_escrow
OSPLATFORM_TYPE: x64
OSNAME: Windows 7
FAILURE_ID_HASH: {599daa89-6b98-55c3-86f3-c72abe59b13d}
Followup: Pool_corruption
---------
---------