PAGE_FAULT_IN_NONPAGED_AREA (50)
Invalid system memory was referenced. This cannot be protected by try-except,
it must be protected by a Probe. Typically the address is just plain bad or it
is pointing at freed memory.
Arguments:
Arg1: fffff900c266f084, memory referenced.
Arg2: 0000000000000000, value 0 = read operation, 1 = write operation.
Arg3: fffff9600024779c, If non-zero, the instruction address which referenced the bad memory
address.
Arg4: 0000000000000000, (reserved)
Debugging Details:
------------------
Could not read faulting driver name
TRIAGER: Could not open triage file : e:\dump_analysis\program\triage\modclass.ini, error 2
READ_ADDRESS: GetPointerFromAddress: unable to read from fffff800032bd0e0
GetUlongFromAddress: unable to read from fffff800032bd198
fffff900c266f084
FAULTING_IP:
win32k!GreSetRedirectionSurfaceSignaling+104
fffff960`0024779c f6465c01 test byte ptr [rsi+5Ch],1
MM_INTERNAL_CODE: 0
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: WIN7_DRIVER_FAULT
BUGCHECK_STR: 0x50
PROCESS_NAME: dwm.exe
CURRENT_IRQL: 0
TRAP_FRAME: fffff880065f5980 -- (.trap 0xfffff880065f5980)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=fffffa8005e74060 rbx=0000000000000000 rcx=fffff880065f5ae0
rdx=fffff900c021a898 rsi=0000000000000000 rdi=0000000000000000
rip=fffff9600024779c rsp=fffff880065f5b10 rbp=ffffffffa91211b1
r8=0000000000000001 r9=00000000000011b1 r10=000000000386f7a0
r11=fffff880065f5b08 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei ng nz na po nc
win32k!GreSetRedirectionSurfaceSignaling+0x104:
fffff960`0024779c f6465c01 test byte ptr [rsi+5Ch],1 ds:00000000`0000005c=??
Resetting default scope
LAST_CONTROL_TRANSFER: from fffff800031061e4 to fffff80003086f00
STACK_TEXT:
fffff880`065f5818 fffff800`031061e4 : 00000000`00000050 fffff900`c266f084 00000000`00000000 fffff880`065f5980 : nt!KeBugCheckEx
fffff880`065f5820 fffff800`03084fee : 00000000`00000000 fffff900`c06e3a60 fffffa80`05e74100 00000000`00000000 : nt! ?? ::FNODOBFM::`string'+0x42907
fffff880`065f5980 fffff960`0024779c : 00000000`00000000 ffffffff`a91211b1 00000000`0386f840 fffff8a0`01c69000 : nt!KiPageFault+0x16e
fffff880`065f5b10 fffff960`0026a969 : 00000000`00000001 fffff880`065f5c60 00000000`0386f840 00000000`000089f2 : win32k!GreSetRedirectionSurfaceSignaling+0x104
fffff880`065f5b60 fffff800`03086153 : fffffa80`05e74060 fffffa80`05e866e0 fffffa80`05eb91d0 fffffa80`05e866e0 : win32k!NtGdiHLSurfSetInformation+0x209
fffff880`065f5be0 000007fe`ff324efa : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x13
00000000`0386f778 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x7fe`ff324efa
STACK_COMMAND: kb
FOLLOWUP_IP:
win32k!GreSetRedirectionSurfaceSignaling+104
fffff960`0024779c f6465c01 test byte ptr [rsi+5Ch],1
SYMBOL_STACK_INDEX: 3
SYMBOL_NAME: win32k!GreSetRedirectionSurfaceSignaling+104
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: win32k
IMAGE_NAME: win32k.sys
DEBUG_FLR_IMAGE_TIMESTAMP: 4a5bc5e0
FAILURE_BUCKET_ID: X64_0x50_win32k!GreSetRedirectionSurfaceSignaling+ 104
BUCKET_ID: X64_0x50_win32k!GreSetRedirectionSurfaceSignaling+ 104