Citation :
Microsoft (R) Windows Debugger Version 6.11.0001.404 X86 Copyright (c) Microsoft Corporation. All rights reserved. Loading Dump File [D:\Mes Documents\Downloads\070209-24437-01.dmp] Mini Kernel Dump File: Only registers and stack trace are available Symbol search path is: srv*c:\symbols*http://msdl.microsoft.com/download/symbols Executable search path is: Windows 7 Kernel Version 7100 MP (2 procs) Free x64 Product: WinNt, suite: TerminalServer SingleUserTS Built by: 7100.0.amd64fre.winmain_win7rc.090421-1700 Machine Name: Kernel base = 0xfffff800`02a5d000 PsLoadedModuleList = 0xfffff800`02c96e90 Debug session time: Thu Jul 2 19:05:48.198 2009 (GMT+2) System Uptime: 0 days 4:31:15.823 Loading Kernel Symbols ............................................................... ................................................................ ............................. Loading User Symbols Loading unloaded module list ........ ******************************************************************************* * * * Bugcheck Analysis * * * ******************************************************************************* Use !analyze -v to get detailed debugging information. BugCheck 50, {fffff8800e4b07f8, 0, fffff88003a1d0b9, 2} Unable to load image \SystemRoot\System32\win32k.sys, Win32 error 0n2 *** WARNING: Unable to verify timestamp for win32k.sys *** ERROR: Module load completed but symbols could not be loaded for win32k.sys Could not read faulting driver name Probably caused by : dxgmms1.sys ( dxgmms1!VIDMM_GLOBAL::ReferenceDmaBuffer+169 ) Followup: MachineOwner --------- 0: kd> !analyze -v ******************************************************************************* * * * Bugcheck Analysis * * * ******************************************************************************* PAGE_FAULT_IN_NONPAGED_AREA (50) Invalid system memory was referenced. This cannot be protected by try-except, it must be protected by a Probe. Typically the address is just plain bad or it is pointing at freed memory. Arguments: Arg1: fffff8800e4b07f8, memory referenced. Arg2: 0000000000000000, value 0 = read operation, 1 = write operation. Arg3: fffff88003a1d0b9, If non-zero, the instruction address which referenced the bad memory address. Arg4: 0000000000000002, (reserved) Debugging Details: ------------------ Could not read faulting driver name READ_ADDRESS: GetPointerFromAddress: unable to read from fffff80002d010e0 fffff8800e4b07f8 FAULTING_IP: dxgmms1!VIDMM_GLOBAL::ReferenceDmaBuffer+169 fffff880`03a1d0b9 448b54c208 mov r10d,dword ptr [rdx+rax*8+8] MM_INTERNAL_CODE: 2 CUSTOMER_CRASH_COUNT: 1 DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT BUGCHECK_STR: 0x50 PROCESS_NAME: BF2142.exe CURRENT_IRQL: 0 TRAP_FRAME: fffff88009a600a0 -- (.trap 0xfffff88009a600a0) NOTE: The trap frame does not contain all registers. Some register values may be zeroed or incorrect. rax=00000000000032fe rbx=0000000000000000 rcx=000000000000197f rdx=fffff8800e497000 rsi=0000000000000000 rdi=0000000000000000 rip=fffff88003a1d0b9 rsp=fffff88009a60230 rbp=fffff88009a60a40 r8=fffffa80043d5050 r9=0000000000000002 r10=fffff8a006e2f1f0 r11=0000000080065fc0 r12=0000000000000000 r13=0000000000000000 r14=0000000000000000 r15=0000000000000000 iopl=0 nv up ei pl nz ac pe nc dxgmms1!VIDMM_GLOBAL::ReferenceDmaBuffer+0x169: fffff880`03a1d0b9 448b54c208 mov r10d,dword ptr [rdx+rax*8+8] ds:5018:fffff880`0e4b07f8=???????? Resetting default scope LAST_CONTROL_TRANSFER: from fffff80002b43ffa to fffff80002adbf80 STACK_TEXT: fffff880`09a5ff38 fffff800`02b43ffa : 00000000`00000050 fffff880`0e4b07f8 00000000`00000000 fffff880`09a600a0 : nt!KeBugCheckEx fffff880`09a5ff40 fffff800`02ada06e : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt! ?? ::FNODOBFM::`string'+0x3de60 fffff880`09a600a0 fffff880`03a1d0b9 : 00000000`00000000 00000000`0000000f fffffa80`08203101 fffffa80`07255010 : nt!KiPageFault+0x16e fffff880`09a60230 fffff880`03a033e7 : fffff880`09a60a01 fffffa80`0773f610 00000000`073e0050 00000000`0000001c : dxgmms1!VIDMM_GLOBAL::ReferenceDmaBuffer+0x169 fffff880`09a60320 fffff880`04168b0a : 00000000`00000001 00000000`00000200 fffff880`09a60a40 00000000`00000000 : dxgmms1!VidMmReferenceDmaBuffer+0x43 fffff880`09a60370 fffff880`041682cf : fffff8a0`00000001 fffff8a0`0edc1830 fffff880`09a609f0 00000000`00000000 : dxgkrnl!DXGCONTEXT::Render+0x326 fffff880`09a60980 fffff960`0019b122 : 00000000`07d7e6b0 00000000`7ef86000 00000000`07d7fd20 00000000`7ef86000 : dxgkrnl!DxgkRender+0x3e7 fffff880`09a60bf0 00000000`07d7e6b0 : 00000000`7ef86000 00000000`07d7fd20 00000000`7ef86000 00000000`00000000 : win32k+0x18b122 fffff880`09a60bf8 00000000`7ef86000 : 00000000`07d7fd20 00000000`7ef86000 00000000`00000000 fffff800`02adb1d3 : 0x7d7e6b0 fffff880`09a60c00 00000000`07d7fd20 : 00000000`7ef86000 00000000`00000000 fffff800`02adb1d3 fffffa80`04304380 : 0x7ef86000 fffff880`09a60c08 00000000`7ef86000 : 00000000`00000000 fffff800`02adb1d3 fffffa80`04304380 00000000`00000490 : 0x7d7fd20 fffff880`09a60c10 00000000`00000000 : fffff800`02adb1d3 fffffa80`04304380 00000000`00000490 00000000`00000000 : 0x7ef86000 STACK_COMMAND: kb FOLLOWUP_IP: dxgmms1!VIDMM_GLOBAL::ReferenceDmaBuffer+169 fffff880`03a1d0b9 448b54c208 mov r10d,dword ptr [rdx+rax*8+8] SYMBOL_STACK_INDEX: 3 SYMBOL_NAME: dxgmms1!VIDMM_GLOBAL::ReferenceDmaBuffer+169 FOLLOWUP_NAME: MachineOwner MODULE_NAME: dxgmms1 IMAGE_NAME: dxgmms1.sys DEBUG_FLR_IMAGE_TIMESTAMP: 49ee92b2 FAILURE_BUCKET_ID: X64_0x50_dxgmms1!VIDMM_GLOBAL::ReferenceDmaBuffer+169 BUCKET_ID: X64_0x50_dxgmms1!VIDMM_GLOBAL::ReferenceDmaBuffer+169 Followup: MachineOwner --------- 0: kd> !analyze -v ******************************************************************************* * * * Bugcheck Analysis * * * ******************************************************************************* PAGE_FAULT_IN_NONPAGED_AREA (50) Invalid system memory was referenced. This cannot be protected by try-except, it must be protected by a Probe. Typically the address is just plain bad or it is pointing at freed memory. Arguments: Arg1: fffff8800e4b07f8, memory referenced. Arg2: 0000000000000000, value 0 = read operation, 1 = write operation. Arg3: fffff88003a1d0b9, If non-zero, the instruction address which referenced the bad memory address. Arg4: 0000000000000002, (reserved) Debugging Details: ------------------ Could not read faulting driver name READ_ADDRESS: fffff8800e4b07f8 FAULTING_IP: dxgmms1!VIDMM_GLOBAL::ReferenceDmaBuffer+169 fffff880`03a1d0b9 448b54c208 mov r10d,dword ptr [rdx+rax*8+8] MM_INTERNAL_CODE: 2 CUSTOMER_CRASH_COUNT: 1 DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT BUGCHECK_STR: 0x50 PROCESS_NAME: BF2142.exe CURRENT_IRQL: 0 TRAP_FRAME: fffff88009a600a0 -- (.trap 0xfffff88009a600a0) NOTE: The trap frame does not contain all registers. Some register values may be zeroed or incorrect. rax=00000000000032fe rbx=0000000000000000 rcx=000000000000197f rdx=fffff8800e497000 rsi=0000000000000000 rdi=0000000000000000 rip=fffff88003a1d0b9 rsp=fffff88009a60230 rbp=fffff88009a60a40 r8=fffffa80043d5050 r9=0000000000000002 r10=fffff8a006e2f1f0 r11=0000000080065fc0 r12=0000000000000000 r13=0000000000000000 r14=0000000000000000 r15=0000000000000000 iopl=0 nv up ei pl nz ac pe nc dxgmms1!VIDMM_GLOBAL::ReferenceDmaBuffer+0x169: fffff880`03a1d0b9 448b54c208 mov r10d,dword ptr [rdx+rax*8+8] ds:5018:fffff880`0e4b07f8=???????? Resetting default scope LAST_CONTROL_TRANSFER: from fffff80002b43ffa to fffff80002adbf80 STACK_TEXT: fffff880`09a5ff38 fffff800`02b43ffa : 00000000`00000050 fffff880`0e4b07f8 00000000`00000000 fffff880`09a600a0 : nt!KeBugCheckEx fffff880`09a5ff40 fffff800`02ada06e : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt! ?? ::FNODOBFM::`string'+0x3de60 fffff880`09a600a0 fffff880`03a1d0b9 : 00000000`00000000 00000000`0000000f fffffa80`08203101 fffffa80`07255010 : nt!KiPageFault+0x16e fffff880`09a60230 fffff880`03a033e7 : fffff880`09a60a01 fffffa80`0773f610 00000000`073e0050 00000000`0000001c : dxgmms1!VIDMM_GLOBAL::ReferenceDmaBuffer+0x169 fffff880`09a60320 fffff880`04168b0a : 00000000`00000001 00000000`00000200 fffff880`09a60a40 00000000`00000000 : dxgmms1!VidMmReferenceDmaBuffer+0x43 fffff880`09a60370 fffff880`041682cf : fffff8a0`00000001 fffff8a0`0edc1830 fffff880`09a609f0 00000000`00000000 : dxgkrnl!DXGCONTEXT::Render+0x326 fffff880`09a60980 fffff960`0019b122 : 00000000`07d7e6b0 00000000`7ef86000 00000000`07d7fd20 00000000`7ef86000 : dxgkrnl!DxgkRender+0x3e7 fffff880`09a60bf0 00000000`07d7e6b0 : 00000000`7ef86000 00000000`07d7fd20 00000000`7ef86000 00000000`00000000 : win32k+0x18b122 fffff880`09a60bf8 00000000`7ef86000 : 00000000`07d7fd20 00000000`7ef86000 00000000`00000000 fffff800`02adb1d3 : 0x7d7e6b0 fffff880`09a60c00 00000000`07d7fd20 : 00000000`7ef86000 00000000`00000000 fffff800`02adb1d3 fffffa80`04304380 : 0x7ef86000 fffff880`09a60c08 00000000`7ef86000 : 00000000`00000000 fffff800`02adb1d3 fffffa80`04304380 00000000`00000490 : 0x7d7fd20 fffff880`09a60c10 00000000`00000000 : fffff800`02adb1d3 fffffa80`04304380 00000000`00000490 00000000`00000000 : 0x7ef86000 STACK_COMMAND: kb FOLLOWUP_IP: dxgmms1!VIDMM_GLOBAL::ReferenceDmaBuffer+169 fffff880`03a1d0b9 448b54c208 mov r10d,dword ptr [rdx+rax*8+8] SYMBOL_STACK_INDEX: 3 SYMBOL_NAME: dxgmms1!VIDMM_GLOBAL::ReferenceDmaBuffer+169 FOLLOWUP_NAME: MachineOwner MODULE_NAME: dxgmms1 IMAGE_NAME: dxgmms1.sys DEBUG_FLR_IMAGE_TIMESTAMP: 49ee92b2 FAILURE_BUCKET_ID: X64_0x50_dxgmms1!VIDMM_GLOBAL::ReferenceDmaBuffer+169 BUCKET_ID: X64_0x50_dxgmms1!VIDMM_GLOBAL::ReferenceDmaBuffer+169 Followup: MachineOwner --------- 0: kd> !analyze -v ******************************************************************************* * * * Bugcheck Analysis * * * ******************************************************************************* PAGE_FAULT_IN_NONPAGED_AREA (50) Invalid system memory was referenced. This cannot be protected by try-except, it must be protected by a Probe. Typically the address is just plain bad or it is pointing at freed memory. Arguments: Arg1: fffff8800e4b07f8, memory referenced. Arg2: 0000000000000000, value 0 = read operation, 1 = write operation. Arg3: fffff88003a1d0b9, If non-zero, the instruction address which referenced the bad memory address. Arg4: 0000000000000002, (reserved) Debugging Details: ------------------ Could not read faulting driver name READ_ADDRESS: fffff8800e4b07f8 FAULTING_IP: dxgmms1!VIDMM_GLOBAL::ReferenceDmaBuffer+169 fffff880`03a1d0b9 448b54c208 mov r10d,dword ptr [rdx+rax*8+8] MM_INTERNAL_CODE: 2 CUSTOMER_CRASH_COUNT: 1 DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT BUGCHECK_STR: 0x50 PROCESS_NAME: BF2142.exe CURRENT_IRQL: 0 TRAP_FRAME: fffff88009a600a0 -- (.trap 0xfffff88009a600a0) NOTE: The trap frame does not contain all registers. Some register values may be zeroed or incorrect. rax=00000000000032fe rbx=0000000000000000 rcx=000000000000197f rdx=fffff8800e497000 rsi=0000000000000000 rdi=0000000000000000 rip=fffff88003a1d0b9 rsp=fffff88009a60230 rbp=fffff88009a60a40 r8=fffffa80043d5050 r9=0000000000000002 r10=fffff8a006e2f1f0 r11=0000000080065fc0 r12=0000000000000000 r13=0000000000000000 r14=0000000000000000 r15=0000000000000000 iopl=0 nv up ei pl nz ac pe nc dxgmms1!VIDMM_GLOBAL::ReferenceDmaBuffer+0x169: fffff880`03a1d0b9 448b54c208 mov r10d,dword ptr [rdx+rax*8+8] ds:5018:fffff880`0e4b07f8=???????? Resetting default scope LAST_CONTROL_TRANSFER: from fffff80002b43ffa to fffff80002adbf80 STACK_TEXT: fffff880`09a5ff38 fffff800`02b43ffa : 00000000`00000050 fffff880`0e4b07f8 00000000`00000000 fffff880`09a600a0 : nt!KeBugCheckEx fffff880`09a5ff40 fffff800`02ada06e : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt! ?? ::FNODOBFM::`string'+0x3de60 fffff880`09a600a0 fffff880`03a1d0b9 : 00000000`00000000 00000000`0000000f fffffa80`08203101 fffffa80`07255010 : nt!KiPageFault+0x16e fffff880`09a60230 fffff880`03a033e7 : fffff880`09a60a01 fffffa80`0773f610 00000000`073e0050 00000000`0000001c : dxgmms1!VIDMM_GLOBAL::ReferenceDmaBuffer+0x169 fffff880`09a60320 fffff880`04168b0a : 00000000`00000001 00000000`00000200 fffff880`09a60a40 00000000`00000000 : dxgmms1!VidMmReferenceDmaBuffer+0x43 fffff880`09a60370 fffff880`041682cf : fffff8a0`00000001 fffff8a0`0edc1830 fffff880`09a609f0 00000000`00000000 : dxgkrnl!DXGCONTEXT::Render+0x326 fffff880`09a60980 fffff960`0019b122 : 00000000`07d7e6b0 00000000`7ef86000 00000000`07d7fd20 00000000`7ef86000 : dxgkrnl!DxgkRender+0x3e7 fffff880`09a60bf0 00000000`07d7e6b0 : 00000000`7ef86000 00000000`07d7fd20 00000000`7ef86000 00000000`00000000 : win32k+0x18b122 fffff880`09a60bf8 00000000`7ef86000 : 00000000`07d7fd20 00000000`7ef86000 00000000`00000000 fffff800`02adb1d3 : 0x7d7e6b0 fffff880`09a60c00 00000000`07d7fd20 : 00000000`7ef86000 00000000`00000000 fffff800`02adb1d3 fffffa80`04304380 : 0x7ef86000 fffff880`09a60c08 00000000`7ef86000 : 00000000`00000000 fffff800`02adb1d3 fffffa80`04304380 00000000`00000490 : 0x7d7fd20 fffff880`09a60c10 00000000`00000000 : fffff800`02adb1d3 fffffa80`04304380 00000000`00000490 00000000`00000000 : 0x7ef86000 STACK_COMMAND: kb FOLLOWUP_IP: dxgmms1!VIDMM_GLOBAL::ReferenceDmaBuffer+169 fffff880`03a1d0b9 448b54c208 mov r10d,dword ptr [rdx+rax*8+8] SYMBOL_STACK_INDEX: 3 SYMBOL_NAME: dxgmms1!VIDMM_GLOBAL::ReferenceDmaBuffer+169 FOLLOWUP_NAME: MachineOwner MODULE_NAME: dxgmms1 IMAGE_NAME: dxgmms1.sys DEBUG_FLR_IMAGE_TIMESTAMP: 49ee92b2 FAILURE_BUCKET_ID: X64_0x50_dxgmms1!VIDMM_GLOBAL::ReferenceDmaBuffer+169 BUCKET_ID: X64_0x50_dxgmms1!VIDMM_GLOBAL::ReferenceDmaBuffer+169 Followup: MachineOwner ---------
|