Could not read faulting driver name
Probably caused by : dxgmms1.sys ( dxgmms1!VIDMM_GLOBAL::ReferenceAllocationForPreparation+19 )
Followup: MachineOwner
---------
6: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
PAGE_FAULT_IN_NONPAGED_AREA (50)
Invalid system memory was referenced. This cannot be protected by try-except,
it must be protected by a Probe. Typically the address is just plain bad or it
is pointing at freed memory.
Arguments:
Arg1: fffffa8045d456a0, memory referenced.
Arg2: 0000000000000000, value 0 = read operation, 1 = write operation.
Arg3: fffff88003e20ce5, If non-zero, the instruction address which referenced the bad memory
address.
Arg4: 0000000000000005, (reserved)
Debugging Details:
------------------
Could not read faulting driver name
READ_ADDRESS: GetPointerFromAddress: unable to read from fffff800033080e0
fffffa8045d456a0
FAULTING_IP:
dxgmms1!VIDMM_GLOBAL::ReferenceAllocationForPreparation+19
fffff880`03e20ce5 488b02 mov rax,qword ptr [rdx]
MM_INTERNAL_CODE: 5
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT
BUGCHECK_STR: 0x50
PROCESS_NAME: System
CURRENT_IRQL: 0
TRAP_FRAME: fffff880042c8750 -- (.trap 0xfffff880042c8750)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=fffff880042c8908 rbx=0000000000000000 rcx=fffffa8007af9000
rdx=fffffa8045d456a0 rsi=0000000000000000 rdi=0000000000000000
rip=fffff88003e20ce5 rsp=fffff880042c88e0 rbp=fffffa8005968730
r8=fffffa80057b3501 r9=0000000000000000 r10=0000000000000000
r11=0000000000000102 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei ng nz na pe nc
dxgmms1!VIDMM_GLOBAL::ReferenceAllocationForPreparation+0x19:
fffff880`03e20ce5 488b02 mov rax,qword ptr [rdx] ds:4360:fffffa80`45d456a0=????????????????
Resetting default scope
LAST_CONTROL_TRANSFER: from fffff8000314f8c1 to fffff800030d0740
STACK_TEXT:
fffff880`042c85e8 fffff800`0314f8c1 : 00000000`00000050 fffffa80`45d456a0 00000000`00000000 fffff880`042c8750 : nt!KeBugCheckEx
fffff880`042c85f0 fffff800`030ce82e : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt! ?? ::FNODOBFM::`string'+0x40e8b
fffff880`042c8750 fffff880`03e20ce5 : 00000000`ffffd978 00000000`0000000f fffffa80`07aea000 fffffa80`07aeb1a0 : nt!KiPageFault+0x16e
fffff880`042c88e0 fffff880`03e1ded3 : 00000000`00000000 fffffa80`058f57b8 00000000`0000000b 00000000`00000000 : dxgmms1!VIDMM_GLOBAL::ReferenceAllocationForPreparation+0x19
fffff880`042c8910 fffff880`03e3865d : 00000000`00000000 fffff8a0`07f66c80 fffffa80`00000000 fffffa80`057b35e0 : dxgmms1!VIDMM_GLOBAL::PrepareDmaBuffer+0x43f
fffff880`042c8ae0 fffff880`03e38398 : fffff800`00b96080 fffff880`03e37d00 fffffa80`00000000 fffffa80`00000000 : dxgmms1!VidSchiSubmitRenderCommand+0x241
fffff880`042c8cd0 fffff880`03e37e96 : 00000000`00000000 fffffa80`058826f0 00000000`00000080 fffffa80`07a5c410 : dxgmms1!VidSchiSubmitQueueCommand+0x50
fffff880`042c8d00 fffff800`03374c06 : 00000000`02bdd03e fffffa80`07a64360 fffffa80`0550a040 fffffa80`07a64360 : dxgmms1!VidSchiWorkerThread+0xd6
fffff880`042c8d40 fffff800`030aec26 : fffff800`0324ae80 fffffa80`07a64360 fffff800`03258c40 fffff880`01263534 : nt!PspSystemThreadStartup+0x5a
fffff880`042c8d80 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KxStartSystemThread+0x16
STACK_COMMAND: kb
FOLLOWUP_IP:
dxgmms1!VIDMM_GLOBAL::ReferenceAllocationForPreparation+19
fffff880`03e20ce5 488b02 mov rax,qword ptr [rdx]
SYMBOL_STACK_INDEX: 3
SYMBOL_NAME: dxgmms1!VIDMM_GLOBAL::ReferenceAllocationForPreparation+19
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: dxgmms1
IMAGE_NAME: dxgmms1.sys
DEBUG_FLR_IMAGE_TIMESTAMP: 4a5bc578
FAILURE_BUCKET_ID: X64_0x50_dxgmms1!VIDMM_GLOBAL::ReferenceAllocationForPreparation+19
BUCKET_ID: X64_0x50_dxgmms1!VIDMM_GLOBAL::ReferenceAllocationForPreparation+19
Followup: MachineOwner
---------