Microsoft (R) Windows Debugger Version 6.12.0002.633 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [F:\a\Minidump\D M P\DMP\020211-18517-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
Symbol search path is: SRV*c:\websymbols*http://msdl.microsoft.com/download/symbols
Executable search path is:
Windows 7 Kernel Version 7600 MP (8 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS
Built by: 7600.16385.amd64fre.win7_rtm.090713-1255
Machine Name:
Kernel base = 0xfffff800`02a63000 PsLoadedModuleList = 0xfffff800`02ca0e50
Debug session time: Wed Feb 2 05:23:39.083 2011 (UTC - 5:00)
System Uptime: 6 days 3:26:38.359
Loading Kernel Symbols
...............................................................
................................................................
................
Loading User Symbols
Loading unloaded module list
........................
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
Use !analyze -v to get detailed debugging information.
BugCheck 50, {fffff8a080d8c640, 0, fffff8800434796c, 5}
Could not read faulting driver name
Probably caused by : dxgmms1.sys ( dxgmms1!VidMmDestroyAllocation+2c )
Followup: MachineOwner
---------
6: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
PAGE_FAULT_IN_NONPAGED_AREA (50)
Invalid system memory was referenced. This cannot be protected by try-except,
it must be protected by a Probe. Typically the address is just plain bad or it
is pointing at freed memory.
Arguments:
Arg1: fffff8a080d8c640, memory referenced.
Arg2: 0000000000000000, value 0 = read operation, 1 = write operation.
Arg3: fffff8800434796c, If non-zero, the instruction address which referenced the bad memory
address.
Arg4: 0000000000000005, (reserved)
Debugging Details:
------------------
Could not read faulting driver name
READ_ADDRESS: GetPointerFromAddress: unable to read from fffff80002d0b0e0
fffff8a080d8c640
FAULTING_IP:
dxgmms1!VidMmDestroyAllocation+2c
fffff880`0434796c 488b3f mov rdi,qword ptr [rdi]
MM_INTERNAL_CODE: 5
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT
BUGCHECK_STR: 0x50
PROCESS_NAME: javaw.exe
CURRENT_IRQL: 0
TRAP_FRAME: fffff88008ddc420 -- (.trap 0xfffff88008ddc420)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=fffff880043578d0 rbx=0000000000000000 rcx=fffff8a009471cd0
rdx=fffff8a004987810 rsi=0000000000000000 rdi=0000000000000000
rip=fffff8800434796c rsp=fffff88008ddc5b0 rbp=fffffa8005bd3000
r8=fffff8a080d8c4e0 r9=0000000000000000 r10=0000000000000000
r11=fffff880019e1120 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei pl nz na po nc
dxgmms1!VidMmDestroyAllocation+0x2c:
fffff880`0434796c 488b3f mov rdi,qword ptr [rdi] ds:00000000`00000000=????????????????
Resetting default scope
LAST_CONTROL_TRANSFER: from fffff80002b52b91 to fffff80002ad4f00
STACK_TEXT:
fffff880`08ddc2b8 fffff800`02b52b91 : 00000000`00000050 fffff8a0`80d8c640 00000000`00000000 fffff880`08ddc420 : nt!KeBugCheckEx
fffff880`08ddc2c0 fffff800`02ad2fee : 00000000`00000000 fffff8a0`04987810 fffffa80`05989000 fffffa80`04823c90 : nt! ?? ::FNODOBFM::`string'+0x40f5b
fffff880`08ddc420 fffff880`0434796c : fffffa80`055751d0 fffff880`08ddc600 00000000`00000000 00000000`00000000 : nt!KiPageFault+0x16e
fffff880`08ddc5b0 fffff880`04289fb3 : 00000000`00000000 00000000`00000000 fffff8a0`0976a000 00000000`00000174 : dxgmms1!VidMmDestroyAllocation+0x2c
fffff880`08ddc5e0 fffff880`0429c670 : 00000000`00000001 00000000`00000000 00000000`00000000 fffff8a0`00000799 : dxgkrnl!DXGDEVICE::DestroyAllocations+0x5eb
fffff880`08ddc6d0 fffff880`04281815 : 00000000`fffffeda fffff8a0`09971bf0 fffff8a0`0976a000 fffffa80`05bba000 : dxgkrnl!DXGDEVICE::~DXGDEVICE+0x19c
fffff880`08ddc740 fffff880`042bfa6a : 00000000`00000001 fffffa80`05bba000 fffff8a0`09971bf0 fffff8a0`09971c70 : dxgkrnl!DXGADAPTER::DestroyDevice+0x1c9
fffff880`08ddc770 fffff880`042bf400 : fffff900`c1f46ce0 00000000`00000000 00000000`00000001 fffff900`c1f46ce0 : dxgkrnl!DXGPROCESS::Destroy+0xba
fffff880`08ddc820 fffff960`00134964 : 00000000`00001230 fffff900`c1f46ce0 00000000`00000000 fffff900`c1f46ce0 : dxgkrnl!DxgkProcessCallout+0x268
fffff880`08ddc8b0 fffff960`00134063 : fffffa80`05cab800 fffff880`08ddcc20 fffffa80`04310000 fffff800`02ab4872 : win32k!GdiProcessCallout+0x244
fffff880`08ddc930 fffff800`02db75e1 : fffffa80`05cab890 00000000`00000000 00000000`00000000 fffffa80`04313810 : win32k!W32pProcessCallout+0x6b
fffff880`08ddc960 fffff800`02d91b3d : 00000000`00000001 00000000`00000001 fffffa80`78457300 00000000`00000000 : nt!PspExitThread+0x2b1
fffff880`08ddca30 fffff800`02ab1a43 : 00000000`00000100 fffffa80`043138d0 00000000`00000001 fffff800`02adc25d : nt!PsExitSpecialApc+0x1d
fffff880`08ddca60 fffff800`02ab1e80 : 00000000`00000000 fffff880`08ddcae0 fffff800`02d92710 00000000`00000001 : nt!KiDeliverApc+0x2eb
fffff880`08ddcae0 fffff800`02ad41f7 : fffffa80`04313810 00000000`000007a0 00000000`00000000 fffffa80`05757390 : nt!KiInitiateUserApc+0x70
fffff880`08ddcc20 00000000`74462dd9 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceExit+0x9c
00000000`0980f0f8 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x74462dd9
STACK_COMMAND: kb
FOLLOWUP_IP:
dxgmms1!VidMmDestroyAllocation+2c
fffff880`0434796c 488b3f mov rdi,qword ptr [rdi]
SYMBOL_STACK_INDEX: 3
SYMBOL_NAME: dxgmms1!VidMmDestroyAllocation+2c
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: dxgmms1
IMAGE_NAME: dxgmms1.sys
DEBUG_FLR_IMAGE_TIMESTAMP: 4a5bc578
FAILURE_BUCKET_ID: X64_0x50_dxgmms1!VidMmDestroyAllocation+2c
BUCKET_ID: X64_0x50_dxgmms1!VidMmDestroyAllocation+2c
Followup: MachineOwner
---------