K
Kaloyan056
I've been getting a lot of bsod's lately. Mainly from driver "ntoskrnl.exe" (I've checked from Blue screen view)
I've done !analyze command for the latest one:
For analysis of this file, run !analyze -v
3: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
PAGE_FAULT_IN_NONPAGED_AREA (50)
Invalid system memory was referenced. This cannot be protected by try-except.
Typically the address is just plain bad or it is pointing at freed memory.
Arguments:
Arg1: fffff80600000000, memory referenced.
Arg2: 0000000000000002, value 0 = read operation, 1 = write operation.
Arg3: fffff80676340e54, If non-zero, the instruction address which referenced the bad memory
address.
Arg4: 0000000000000002, (reserved)
Debugging Details:
------------------
KEY_VALUES_STRING: 1
Key : Analysis.CPU.Sec
Value: 2
Key : Analysis.DebugAnalysisProvider.CPP
Value: Create: 8007007e on KALOYANPC
Key : Analysis.DebugData
Value: CreateObject
Key : Analysis.DebugModel
Value: CreateObject
Key : Analysis.Elapsed.Sec
Value: 2
Key : Analysis.Memory.CommitPeak.Mb
Value: 75
Key : Analysis.System
Value: CreateObject
BUGCHECK_CODE: 50
BUGCHECK_P1: fffff80600000000
BUGCHECK_P2: 2
BUGCHECK_P3: fffff80676340e54
BUGCHECK_P4: 2
READ_ADDRESS: fffff80600000000
MM_INTERNAL_CODE: 2
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXPNP: 1 (!blackboxpnp)
BLACKBOXWINLOGON: 1
PROCESS_NAME: wallpaper32.exe
TRAP_FRAME: ffffa606af124fa0 -- (.trap 0xffffa606af124fa0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000000 rbx=0000000000000000 rcx=ffffbc887fab0080
rdx=ffffbc88793f5db8 rsi=0000000000000000 rdi=0000000000000000
rip=fffff80676340e54 rsp=ffffa606af125130 rbp=ffffa606af1252a0
r8=ffffa606af125180 r9=0000000000000014 r10=fffff80676340d40
r11=fffff806ad2c0000 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei pl zr na po nc
nt!ExTryAcquirePushLockExclusiveEx+0x114:
fffff806`76340e54 f0480fba2e00 lock bts qword ptr [rsi],0 ds:00000000`00000000=????????????????
Resetting default scope
STACK_TEXT:
ffffa606`af124cf8 fffff806`7641ebbb : 00000000`00000050 fffff806`00000000 00000000`00000002 ffffa606`af124fa0 : nt!KeBugCheckEx
ffffa606`af124d00 fffff806`7620c960 : ffffbc88`856d4588 00000000`00000002 ffffa606`af125020 00000000`00000000 : nt!MiSystemFault+0x1f43ab
ffffa606`af124e00 fffff806`76403c5e : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!MmAccessFault+0x400
ffffa606`af124fa0 fffff806`76340e54 : ffffbc88`7fab0080 ffffbc88`793f5db8 00000000`00000000 00000000`00000000 : nt!KiPageFault+0x35e
ffffa606`af125130 fffff806`ad33d5fc : ffffbc88`793f5db8 ffffbc88`00000001 00000000`00000000 00000000`00000000 : nt!ExTryAcquirePushLockExclusiveEx+0x114
ffffa606`af125170 fffff806`ad2c7b66 : ffffbc88`77339000 00000000`0009e462 00000000`00000000 ffffa606`af125290 : dxgmms2!VIDMM_DEVICE::EnsureSchedulable+0x5c
ffffa606`af1251a0 fffff806`a608acf1 : 00000000`00000000 ffffa606`af1254f8 00000000`00000014 ffffa606`af125558 : dxgmms2!VidSchSignalSyncObjectsFromGpu+0x6c6
ffffa606`af1253e0 fffff806`a60d86fe : 00000000`073de710 00000000`00000001 ffffffff`ffffffff ffffbc88`772e9000 : dxgkrnl!SignalSynchronizationObjectInternal+0xcf1
ffffa606`af125810 fffff806`a6065ace : ffff958e`9aebadf0 ffffbc88`7fab0080 00007ffe`0c1b7560 00000000`00000020 : dxgkrnl!DxgkSignalSynchronizationObjectInternal+0x22e
ffffa606`af125ad0 fffff806`764074b8 : ffffbc88`7fab0080 ffffbc88`7fab0080 00007ffe`0c1b9170 00000000`00000020 : dxgkrnl!DxgkSignalSynchronizationObject+0xe
ffffa606`af125b00 00007ffe`0c1c4974 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x28
00000000`073de558 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffe`0c1c4974
SYMBOL_NAME: dxgmms2!VIDMM_DEVICE::EnsureSchedulable+5c
MODULE_NAME: dxgmms2
IMAGE_NAME: dxgmms2.sys
IMAGE_VERSION: 10.0.19041.789
STACK_COMMAND: .thread ; .cxr ; kb
BUCKET_ID_FUNC_OFFSET: 5c
FAILURE_BUCKET_ID: AV_INVALID_dxgmms2!VIDMM_DEVICE::EnsureSchedulable
OS_VERSION: 10.0.19041.1
BUILDLAB_STR: vb_release
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {bea646d8-5ee6-e736-4c3c-1104f142a141}
Followup: MachineOwner
---------
.dmp file link:
Continue reading...
I've done !analyze command for the latest one:
For analysis of this file, run !analyze -v
3: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
PAGE_FAULT_IN_NONPAGED_AREA (50)
Invalid system memory was referenced. This cannot be protected by try-except.
Typically the address is just plain bad or it is pointing at freed memory.
Arguments:
Arg1: fffff80600000000, memory referenced.
Arg2: 0000000000000002, value 0 = read operation, 1 = write operation.
Arg3: fffff80676340e54, If non-zero, the instruction address which referenced the bad memory
address.
Arg4: 0000000000000002, (reserved)
Debugging Details:
------------------
KEY_VALUES_STRING: 1
Key : Analysis.CPU.Sec
Value: 2
Key : Analysis.DebugAnalysisProvider.CPP
Value: Create: 8007007e on KALOYANPC
Key : Analysis.DebugData
Value: CreateObject
Key : Analysis.DebugModel
Value: CreateObject
Key : Analysis.Elapsed.Sec
Value: 2
Key : Analysis.Memory.CommitPeak.Mb
Value: 75
Key : Analysis.System
Value: CreateObject
BUGCHECK_CODE: 50
BUGCHECK_P1: fffff80600000000
BUGCHECK_P2: 2
BUGCHECK_P3: fffff80676340e54
BUGCHECK_P4: 2
READ_ADDRESS: fffff80600000000
MM_INTERNAL_CODE: 2
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXPNP: 1 (!blackboxpnp)
BLACKBOXWINLOGON: 1
PROCESS_NAME: wallpaper32.exe
TRAP_FRAME: ffffa606af124fa0 -- (.trap 0xffffa606af124fa0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000000 rbx=0000000000000000 rcx=ffffbc887fab0080
rdx=ffffbc88793f5db8 rsi=0000000000000000 rdi=0000000000000000
rip=fffff80676340e54 rsp=ffffa606af125130 rbp=ffffa606af1252a0
r8=ffffa606af125180 r9=0000000000000014 r10=fffff80676340d40
r11=fffff806ad2c0000 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei pl zr na po nc
nt!ExTryAcquirePushLockExclusiveEx+0x114:
fffff806`76340e54 f0480fba2e00 lock bts qword ptr [rsi],0 ds:00000000`00000000=????????????????
Resetting default scope
STACK_TEXT:
ffffa606`af124cf8 fffff806`7641ebbb : 00000000`00000050 fffff806`00000000 00000000`00000002 ffffa606`af124fa0 : nt!KeBugCheckEx
ffffa606`af124d00 fffff806`7620c960 : ffffbc88`856d4588 00000000`00000002 ffffa606`af125020 00000000`00000000 : nt!MiSystemFault+0x1f43ab
ffffa606`af124e00 fffff806`76403c5e : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!MmAccessFault+0x400
ffffa606`af124fa0 fffff806`76340e54 : ffffbc88`7fab0080 ffffbc88`793f5db8 00000000`00000000 00000000`00000000 : nt!KiPageFault+0x35e
ffffa606`af125130 fffff806`ad33d5fc : ffffbc88`793f5db8 ffffbc88`00000001 00000000`00000000 00000000`00000000 : nt!ExTryAcquirePushLockExclusiveEx+0x114
ffffa606`af125170 fffff806`ad2c7b66 : ffffbc88`77339000 00000000`0009e462 00000000`00000000 ffffa606`af125290 : dxgmms2!VIDMM_DEVICE::EnsureSchedulable+0x5c
ffffa606`af1251a0 fffff806`a608acf1 : 00000000`00000000 ffffa606`af1254f8 00000000`00000014 ffffa606`af125558 : dxgmms2!VidSchSignalSyncObjectsFromGpu+0x6c6
ffffa606`af1253e0 fffff806`a60d86fe : 00000000`073de710 00000000`00000001 ffffffff`ffffffff ffffbc88`772e9000 : dxgkrnl!SignalSynchronizationObjectInternal+0xcf1
ffffa606`af125810 fffff806`a6065ace : ffff958e`9aebadf0 ffffbc88`7fab0080 00007ffe`0c1b7560 00000000`00000020 : dxgkrnl!DxgkSignalSynchronizationObjectInternal+0x22e
ffffa606`af125ad0 fffff806`764074b8 : ffffbc88`7fab0080 ffffbc88`7fab0080 00007ffe`0c1b9170 00000000`00000020 : dxgkrnl!DxgkSignalSynchronizationObject+0xe
ffffa606`af125b00 00007ffe`0c1c4974 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x28
00000000`073de558 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffe`0c1c4974
SYMBOL_NAME: dxgmms2!VIDMM_DEVICE::EnsureSchedulable+5c
MODULE_NAME: dxgmms2
IMAGE_NAME: dxgmms2.sys
IMAGE_VERSION: 10.0.19041.789
STACK_COMMAND: .thread ; .cxr ; kb
BUCKET_ID_FUNC_OFFSET: 5c
FAILURE_BUCKET_ID: AV_INVALID_dxgmms2!VIDMM_DEVICE::EnsureSchedulable
OS_VERSION: 10.0.19041.1
BUILDLAB_STR: vb_release
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {bea646d8-5ee6-e736-4c3c-1104f142a141}
Followup: MachineOwner
---------
.dmp file link:
Gofile - Free Unlimited File Sharing and Storage
Gofile is a free, secure file sharing and storage platform. With unlimited bandwidth and storage, you can easily store and share files of any type without any limits. Our advanced features, such as CDN support and password protection, make Gofile the ideal choice for individuals and businesses...
gofile.io
Continue reading...