*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
Use !analyze -v to get detailed debugging information.
BugCheck D1, {9c, 2, 1, fffff8800533ae7d}
Probably caused by : dxgmms1.sys ( dxgmms1!VidSchiProfilePerformanceTick+6f1 )
Followup: MachineOwner
---------
2: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
DRIVER_IRQL_NOT_LESS_OR_EQUAL (d1)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high. This is usually
caused by drivers using improper addresses.
If kernel debugger is available get stack backtrace.
Arguments:
Arg1: 000000000000009c, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000001, value 0 = read operation, 1 = write operation
Arg4: fffff8800533ae7d, address which referenced memory
Debugging Details:
------------------
WRITE_ADDRESS: GetPointerFromAddress: unable to read from fffff800030fe100
000000000000009c
CURRENT_IRQL: 2
FAULTING_IP:
dxgmms1!VidSchiProfilePerformanceTick+6f1
fffff880`0533ae7d ff84c28c000000 inc dword ptr [rdx+rax*8+8Ch]
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT
BUGCHECK_STR: 0xD1
PROCESS_NAME: bf3.exe
TRAP_FRAME: fffff880077e3ba0 -- (.trap 0xfffff880077e3ba0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000002 rbx=0000000000000000 rcx=0000000000000001
rdx=0000000000000000 rsi=0000000000000000 rdi=0000000000000000
rip=fffff8800533ae7d rsp=fffff880077e3d30 rbp=0000000000000000
r8=fffffa80099a0000 r9=0000000000000000 r10=00466859000e06e8
r11=000000000000000e r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei pl nz na pe nc
dxgmms1!VidSchiProfilePerformanceTick+0x6f1:
fffff880`0533ae7d ff84c28c000000 inc dword ptr [rdx+rax*8+8Ch] ds:00000000`0000009c=????????
Resetting default scope
LAST_CONTROL_TRANSFER: from fffff80002ecb1e9 to fffff80002ecbc40
STACK_TEXT:
fffff880`077e3a58 fffff800`02ecb1e9 : 00000000`0000000a 00000000`0000009c 00000000`00000002 00000000`00000001 : nt!KeBugCheckEx
fffff880`077e3a60 fffff800`02ec9e60 : 00000000`00020000 fffffa80`099a5c00 00000001`31640000 00000000`00000000 : nt!KiBugCheckDispatch+0x69
fffff880`077e3ba0 fffff880`0533ae7d : 00000000`00000000 00000001`00000001 00000028`00000014 00000000`00000100 : nt!KiPageFault+0x260
fffff880`077e3d30 fffff880`05336c71 : 00000000`0000000d fffffa80`099a0000 fffffa80`099a0bf0 ffffffff`00000000 : dxgmms1!VidSchiProfilePerformanceTick+0x6f1
fffff880`077e3df0 fffff880`05368e65 : fffffa80`099a0000 fffffa80`00000000 00000000`00000000 fffffa80`099a0000 : dxgmms1!VidSchiSendToExecutionQueue+0x77d
fffff880`077e3ef0 fffff880`05352770 : 00000000`ffffda01 00000000`004885de fffffa80`099a6230 00000000`00000000 : dxgmms1!VidSchiSendToExecutionQueueWithWait+0x179
fffff880`077e3ff0 fffff880`05352336 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : dxgmms1!VIDMM_GLOBAL::FlushPagingBufferInternal+0x40c
fffff880`077e4140 fffff880`05352a16 : fffffa80`099a6000 fffffa80`072eedc0 fffff880`077e4698 00000000`00000001 : dxgmms1!VIDMM_GLOBAL::FlushPagingBuffer+0x4e
fffff880`077e4190 fffff880`0535f91c : 00000000`00000000 00000000`00000000 fffff880`077e4698 fffffa80`072eedc0 : dxgmms1!VIDMM_GLOBAL::xWaitForAllEngines+0x4e
fffff880`077e4290 fffff800`03337188 : ffffffff`ffffffff ffffffff`ffffffff 00000000`00000000 00000000`00000000 : dxgmms1!VIDMM_MEMORY_SEGMENT::RotateCopyCallback+0xe0
fffff880`077e4300 fffff880`0536494c : 00000000`37b24000 fffff880`077e45d8 00000000`00000000 fffff8a0`00000002 : nt!MmRotatePhysicalView+0x6e8
fffff880`077e4540 fffff880`0535eeb8 : fffffa80`099a6c60 00000000`00020000 00000000`00000002 00000000`00000000 : dxgmms1!VIDMM_PROCESS_HEAP::Rotate+0x148
fffff880`077e45d0 fffff880`05350904 : fffffa80`099afec0 fffff8a0`0ac247c0 fffff8a0`00000001 fffff880`077e4700 : dxgmms1!VIDMM_MEMORY_SEGMENT::EvictResource+0x6f8
fffff880`077e4740 fffff880`053507e3 : fffffa80`099a6000 fffff880`0535076c 00000000`00000000 fffffa80`0b933210 : dxgmms1!VIDMM_GLOBAL::EvictAllAllocationInList+0x40
fffff880`077e4780 fffff880`0534d70d : 00000000`0000021b 00000000`00000000 00000000`00000000 fffffa80`00000000 : dxgmms1!VIDMM_GLOBAL::EvictAllReclaimedAllocation+0x43
fffff880`077e47d0 fffff880`0536765d : 00000000`00000000 fffff8a0`08bcc590 fffffa80`00000000 fffffa80`0b933210 : dxgmms1!VIDMM_GLOBAL:
repareDmaBuffer+0xc79
fffff880`077e49a0 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : dxgmms1!VidSchiSubmitRenderCommand+0x241
STACK_COMMAND: kb
FOLLOWUP_IP:
dxgmms1!VidSchiProfilePerformanceTick+6f1
fffff880`0533ae7d ff84c28c000000 inc dword ptr [rdx+rax*8+8Ch]
SYMBOL_STACK_INDEX: 3
SYMBOL_NAME: dxgmms1!VidSchiProfilePerformanceTick+6f1
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: dxgmms1
IMAGE_NAME: dxgmms1.sys
DEBUG_FLR_IMAGE_TIMESTAMP: 4ce799c1
FAILURE_BUCKET_ID: X64_0xD1_dxgmms1!VidSchiProfilePerformanceTick+6f1
BUCKET_ID: X64_0xD1_dxgmms1!VidSchiProfilePerformanceTick+6f1
Followup: MachineOwner