K
Kaloyan056
Guest
I've been getting a lot of bsod's lately. Mainly from driver "ntoskrnl.exe" (I've checked from Blue screen view)
I've done !analyze command for the latest one:
For analysis of this file, run !analyze -v
3: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
PAGE_FAULT_IN_NONPAGED_AREA (50)
Invalid system memory was referenced. This cannot be protected by try-except.
Typically the address is just plain bad or it is pointing at freed memory.
Arguments:
Arg1: fffff80600000000, memory referenced.
Arg2: 0000000000000002, value 0 = read operation, 1 = write operation.
Arg3: fffff80676340e54, If non-zero, the instruction address which referenced the bad memory
address.
Arg4: 0000000000000002, (reserved)
Debugging Details:
------------------
KEY_VALUES_STRING: 1
Key : Analysis.CPU.Sec
Value: 2
Key : Analysis.DebugAnalysisProvider.CPP
Value: Create: 8007007e on KALOYANPC
Key : Analysis.DebugData
Value: CreateObject
Key : Analysis.DebugModel
Value: CreateObject
Key : Analysis.Elapsed.Sec
Value: 2
Key : Analysis.Memory.CommitPeak.Mb
Value: 75
Key : Analysis.System
Value: CreateObject
BUGCHECK_CODE: 50
BUGCHECK_P1: fffff80600000000
BUGCHECK_P2: 2
BUGCHECK_P3: fffff80676340e54
BUGCHECK_P4: 2
READ_ADDRESS: fffff80600000000
MM_INTERNAL_CODE: 2
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXPNP: 1 (!blackboxpnp)
BLACKBOXWINLOGON: 1
PROCESS_NAME: wallpaper32.exe
TRAP_FRAME: ffffa606af124fa0 -- (.trap 0xffffa606af124fa0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000000 rbx=0000000000000000 rcx=ffffbc887fab0080
rdx=ffffbc88793f5db8 rsi=0000000000000000 rdi=0000000000000000
rip=fffff80676340e54 rsp=ffffa606af125130 rbp=ffffa606af1252a0
r8=ffffa606af125180 r9=0000000000000014 r10=fffff80676340d40
r11=fffff806ad2c0000 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei pl zr na po nc
nt!ExTryAcquirePushLockExclusiveEx+0x114:
fffff806`76340e54 f0480fba2e00 lock bts qword ptr [rsi],0 ds:00000000`00000000=????????????????
Resetting default scope
STACK_TEXT:
ffffa606`af124cf8 fffff806`7641ebbb : 00000000`00000050 fffff806`00000000 00000000`00000002 ffffa606`af124fa0 : nt!KeBugCheckEx
ffffa606`af124d00 fffff806`7620c960 : ffffbc88`856d4588 00000000`00000002 ffffa606`af125020 00000000`00000000 : nt!MiSystemFault+0x1f43ab
ffffa606`af124e00 fffff806`76403c5e : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!MmAccessFault+0x400
ffffa606`af124fa0 fffff806`76340e54 : ffffbc88`7fab0080 ffffbc88`793f5db8 00000000`00000000 00000000`00000000 : nt!KiPageFault+0x35e
ffffa606`af125130 fffff806`ad33d5fc : ffffbc88`793f5db8 ffffbc88`00000001 00000000`00000000 00000000`00000000 : nt!ExTryAcquirePushLockExclusiveEx+0x114
ffffa606`af125170 fffff806`ad2c7b66 : ffffbc88`77339000 00000000`0009e462 00000000`00000000 ffffa606`af125290 : dxgmms2!VIDMM_DEVICE::EnsureSchedulable+0x5c
ffffa606`af1251a0 fffff806`a608acf1 : 00000000`00000000 ffffa606`af1254f8 00000000`00000014 ffffa606`af125558 : dxgmms2!VidSchSignalSyncObjectsFromGpu+0x6c6
ffffa606`af1253e0 fffff806`a60d86fe : 00000000`073de710 00000000`00000001 ffffffff`ffffffff ffffbc88`772e9000 : dxgkrnl!SignalSynchronizationObjectInternal+0xcf1
ffffa606`af125810 fffff806`a6065ace : ffff958e`9aebadf0 ffffbc88`7fab0080 00007ffe`0c1b7560 00000000`00000020 : dxgkrnl!DxgkSignalSynchronizationObjectInternal+0x22e
ffffa606`af125ad0 fffff806`764074b8 : ffffbc88`7fab0080 ffffbc88`7fab0080 00007ffe`0c1b9170 00000000`00000020 : dxgkrnl!DxgkSignalSynchronizationObject+0xe
ffffa606`af125b00 00007ffe`0c1c4974 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x28
00000000`073de558 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffe`0c1c4974
SYMBOL_NAME: dxgmms2!VIDMM_DEVICE::EnsureSchedulable+5c
MODULE_NAME: dxgmms2
IMAGE_NAME: dxgmms2.sys
IMAGE_VERSION: 10.0.19041.789
STACK_COMMAND: .thread ; .cxr ; kb
BUCKET_ID_FUNC_OFFSET: 5c
FAILURE_BUCKET_ID: AV_INVALID_dxgmms2!VIDMM_DEVICE::EnsureSchedulable
OS_VERSION: 10.0.19041.1
BUILDLAB_STR: vb_release
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {bea646d8-5ee6-e736-4c3c-1104f142a141}
Followup: MachineOwner
---------
.dmp file link:
Gofile
Continue reading...
I've done !analyze command for the latest one:
For analysis of this file, run !analyze -v
3: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
PAGE_FAULT_IN_NONPAGED_AREA (50)
Invalid system memory was referenced. This cannot be protected by try-except.
Typically the address is just plain bad or it is pointing at freed memory.
Arguments:
Arg1: fffff80600000000, memory referenced.
Arg2: 0000000000000002, value 0 = read operation, 1 = write operation.
Arg3: fffff80676340e54, If non-zero, the instruction address which referenced the bad memory
address.
Arg4: 0000000000000002, (reserved)
Debugging Details:
------------------
KEY_VALUES_STRING: 1
Key : Analysis.CPU.Sec
Value: 2
Key : Analysis.DebugAnalysisProvider.CPP
Value: Create: 8007007e on KALOYANPC
Key : Analysis.DebugData
Value: CreateObject
Key : Analysis.DebugModel
Value: CreateObject
Key : Analysis.Elapsed.Sec
Value: 2
Key : Analysis.Memory.CommitPeak.Mb
Value: 75
Key : Analysis.System
Value: CreateObject
BUGCHECK_CODE: 50
BUGCHECK_P1: fffff80600000000
BUGCHECK_P2: 2
BUGCHECK_P3: fffff80676340e54
BUGCHECK_P4: 2
READ_ADDRESS: fffff80600000000
MM_INTERNAL_CODE: 2
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXPNP: 1 (!blackboxpnp)
BLACKBOXWINLOGON: 1
PROCESS_NAME: wallpaper32.exe
TRAP_FRAME: ffffa606af124fa0 -- (.trap 0xffffa606af124fa0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000000 rbx=0000000000000000 rcx=ffffbc887fab0080
rdx=ffffbc88793f5db8 rsi=0000000000000000 rdi=0000000000000000
rip=fffff80676340e54 rsp=ffffa606af125130 rbp=ffffa606af1252a0
r8=ffffa606af125180 r9=0000000000000014 r10=fffff80676340d40
r11=fffff806ad2c0000 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei pl zr na po nc
nt!ExTryAcquirePushLockExclusiveEx+0x114:
fffff806`76340e54 f0480fba2e00 lock bts qword ptr [rsi],0 ds:00000000`00000000=????????????????
Resetting default scope
STACK_TEXT:
ffffa606`af124cf8 fffff806`7641ebbb : 00000000`00000050 fffff806`00000000 00000000`00000002 ffffa606`af124fa0 : nt!KeBugCheckEx
ffffa606`af124d00 fffff806`7620c960 : ffffbc88`856d4588 00000000`00000002 ffffa606`af125020 00000000`00000000 : nt!MiSystemFault+0x1f43ab
ffffa606`af124e00 fffff806`76403c5e : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!MmAccessFault+0x400
ffffa606`af124fa0 fffff806`76340e54 : ffffbc88`7fab0080 ffffbc88`793f5db8 00000000`00000000 00000000`00000000 : nt!KiPageFault+0x35e
ffffa606`af125130 fffff806`ad33d5fc : ffffbc88`793f5db8 ffffbc88`00000001 00000000`00000000 00000000`00000000 : nt!ExTryAcquirePushLockExclusiveEx+0x114
ffffa606`af125170 fffff806`ad2c7b66 : ffffbc88`77339000 00000000`0009e462 00000000`00000000 ffffa606`af125290 : dxgmms2!VIDMM_DEVICE::EnsureSchedulable+0x5c
ffffa606`af1251a0 fffff806`a608acf1 : 00000000`00000000 ffffa606`af1254f8 00000000`00000014 ffffa606`af125558 : dxgmms2!VidSchSignalSyncObjectsFromGpu+0x6c6
ffffa606`af1253e0 fffff806`a60d86fe : 00000000`073de710 00000000`00000001 ffffffff`ffffffff ffffbc88`772e9000 : dxgkrnl!SignalSynchronizationObjectInternal+0xcf1
ffffa606`af125810 fffff806`a6065ace : ffff958e`9aebadf0 ffffbc88`7fab0080 00007ffe`0c1b7560 00000000`00000020 : dxgkrnl!DxgkSignalSynchronizationObjectInternal+0x22e
ffffa606`af125ad0 fffff806`764074b8 : ffffbc88`7fab0080 ffffbc88`7fab0080 00007ffe`0c1b9170 00000000`00000020 : dxgkrnl!DxgkSignalSynchronizationObject+0xe
ffffa606`af125b00 00007ffe`0c1c4974 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x28
00000000`073de558 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffe`0c1c4974
SYMBOL_NAME: dxgmms2!VIDMM_DEVICE::EnsureSchedulable+5c
MODULE_NAME: dxgmms2
IMAGE_NAME: dxgmms2.sys
IMAGE_VERSION: 10.0.19041.789
STACK_COMMAND: .thread ; .cxr ; kb
BUCKET_ID_FUNC_OFFSET: 5c
FAILURE_BUCKET_ID: AV_INVALID_dxgmms2!VIDMM_DEVICE::EnsureSchedulable
OS_VERSION: 10.0.19041.1
BUILDLAB_STR: vb_release
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {bea646d8-5ee6-e736-4c3c-1104f142a141}
Followup: MachineOwner
---------
.dmp file link:
Gofile
Continue reading...