Microsoft (R) Windows Debugger Version 6.11.0001.404 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [C:\Users\FUBAR-RC1-Desktop\Downloads\Minidump5\Mini052309-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
Symbol search path is: SRV*c:\symbols*http://msdl.microsoft.com/download/symbols
Executable search path is:
Windows Server 2008/Windows Vista Kernel Version 6001 (Service Pack 1) MP (4 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS
Built by: 6001.18226.amd64fre.vistasp1_gdr.090302-1506
Machine Name:
Kernel base = 0xfffff800`02006000 PsLoadedModuleList = 0xfffff800`021cbdb0
Debug session time: Sat May 23 11:30:39.982 2009 (GMT-4)
System Uptime: 0 days 1:02:23.231
Loading Kernel Symbols
...............................................................
................................................................
............
Loading User Symbols
Loading unloaded module list
..........
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
Use !analyze -v to get detailed debugging information.
BugCheck 50, {fffffa0007bb5530, 0, fffffa6002cc6d31, 5}
Could not read faulting driver name
Probably caused by : dxgkrnl.sys ( dxgkrnl!VIDMM_GLOBAL::ReferenceAllocationForPreparation+19 )
Followup: MachineOwner
---------
2: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
PAGE_FAULT_IN_NONPAGED_AREA (50)
Invalid system memory was referenced. This cannot be protected by try-except,
it must be protected by a Probe. Typically the address is just plain bad or it
is pointing at freed memory.
Arguments:
Arg1: fffffa0007bb5530, memory referenced.
Arg2: 0000000000000000, value 0 = read operation, 1 = write operation.
Arg3: fffffa6002cc6d31, If non-zero, the instruction address which referenced the bad memory
address.
Arg4: 0000000000000005, (reserved)
Debugging Details:
------------------
Could not read faulting driver name
READ_ADDRESS: GetPointerFromAddress: unable to read from fffff8000222f080
fffffa0007bb5530
FAULTING_IP:
dxgkrnl!VIDMM_GLOBAL::ReferenceAllocationForPreparation+19
fffffa60`02cc6d31 488b02 mov rax,qword ptr [rdx]
MM_INTERNAL_CODE: 5
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT
BUGCHECK_STR: 0x50
PROCESS_NAME: System
CURRENT_IRQL: 0
TRAP_FRAME: fffffa600367e8e0 -- (.trap 0xfffffa600367e8e0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=fffffa600367ea98 rbx=0000000000000000 rcx=fffffa8006b2c000
rdx=fffffa0007bb5530 rsi=0000000000000000 rdi=0000000000000000
rip=fffffa6002cc6d31 rsp=fffffa600367ea70 rbp=fffffa80047519c8
r8=fffffa800465d601 r9=0000000000000000 r10=fffffa800650a000
r11=000000000000f800 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei ng nz na pe nc
dxgkrnl!VIDMM_GLOBAL::ReferenceAllocationForPreparation+0x19:
fffffa60`02cc6d31 488b02 mov rax,qword ptr [rdx] ds:3b20:fffffa00`07bb5530=????????????????
Resetting default scope
LAST_CONTROL_TRANSFER: from fffff800020687f2 to fffff8000205a650
STACK_TEXT:
fffffa60`0367e7e8 fffff800`020687f2 : 00000000`00000050 fffffa00`07bb5530 00000000`00000000 fffffa60`0367e8e0 : nt!KeBugCheckEx
fffffa60`0367e7f0 fffff800`020591d9 : 00000000`00000000 fffff800`0205dced fffffa60`01763100 fffffa80`045c5340 : nt!MmAccessFault+0x4f2
fffffa60`0367e8e0 fffffa60`02cc6d31 : fffffa80`046e7010 00000000`0000e179 ffffffff`ffffffc9 fffffa80`04367010 : nt!KiPageFault+0x119
fffffa60`0367ea70 fffffa60`02cc4a36 : fffffa80`045c5340 00000000`00000000 00000000`00000006 00000000`00000000 : dxgkrnl!VIDMM_GLOBAL::ReferenceAllocationForPreparation+0x19
fffffa60`0367eaa0 fffffa60`02ce0200 : fffffa60`01766cc0 fffff880`0b6fbbf0 fffffa80`00000000 fffffa80`0465d6d0 : dxgkrnl!VIDMM_GLOBAL::PrepareDmaBuffer+0x2de
fffffa60`0367eb50 fffffa60`02cdffdc : fffffa60`01766cc0 fffffa80`0398c900 00000000`00000000 fffffa60`00000000 : dxgkrnl!VidSchiSubmitRenderCommand+0x1b0
fffffa60`0367ece0 fffffa60`02cdfce1 : 00000000`00000000 fffffa80`046e7010 00000000`00000080 fffffa80`067ff540 : dxgkrnl!VidSchiSubmitQueueCommand+0x50
fffffa60`0367ed10 fffff800`0227efd3 : fffffa80`06b2bbb0 fffff800`02054947 fffffa60`019db1f0 00000000`00000001 : dxgkrnl!VidSchiWorkerThread+0xb1
fffffa60`0367ed50 fffff800`02094816 : fffffa60`01763180 fffffa80`06b2bbb0 fffffa60`0176cd40 00000000`00000001 : nt!PspSystemThreadStartup+0x57
fffffa60`0367ed80 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiStartSystemThread+0x16
STACK_COMMAND: kb
FOLLOWUP_IP:
dxgkrnl!VIDMM_GLOBAL::ReferenceAllocationForPreparation+19
fffffa60`02cc6d31 488b02 mov rax,qword ptr [rdx]
SYMBOL_STACK_INDEX: 3
SYMBOL_NAME: dxgkrnl!VIDMM_GLOBAL::ReferenceAllocationForPreparation+19
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: dxgkrnl
IMAGE_NAME: dxgkrnl.sys
DEBUG_FLR_IMAGE_TIMESTAMP: 4893b63f
FAILURE_BUCKET_ID: X64_0x50_dxgkrnl!VIDMM_GLOBAL::ReferenceAllocationForPreparation+19
BUCKET_ID: X64_0x50_dxgkrnl!VIDMM_GLOBAL::ReferenceAllocationForPreparation+19
Followup: MachineOwner
---------