Security Software: ???
Code:
-
Microsoft (R) Windows Debugger Version 6.12.0002.633 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [D:\Kingston\BSODDmpFiles\onyxaj\Windows_NT6_BSOD_jcgriff2\032212-18314-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
Symbol search path is: SRV*C:\SymCache*http://msdl.microsoft.com/download/symbols
Executable search path is:
Windows 7 Kernel Version 7601 (Service Pack 1) MP (8 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS Personal
Built by: 7601.17727.amd64fre.win7sp1_gdr.111118-2330
Machine Name:
Kernel base = 0xfffff800`02e08000 PsLoadedModuleList = 0xfffff800`0304c650
Debug session time: Thu Mar 22 17:10:21.635 2012 (UTC - 6:00)
System Uptime: 0 days 0:08:39.494
Loading Kernel Symbols
...............................................................
................................................................
.............
Loading User Symbols
Loading unloaded module list
.....
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
Use !analyze -v to get detailed debugging information.
BugCheck D1, {fffffa80c59978c8, 2, 0, fffff88001449d1b}
Probably caused by : NETIO.SYS ( NETIO!NsiEnumerateObjectsAllParametersEx+6df )
Followup: MachineOwner
---------
0: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
DRIVER_IRQL_NOT_LESS_OR_EQUAL (d1)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high. This is usually
caused by drivers using improper addresses.
If kernel debugger is available get stack backtrace.
Arguments:
Arg1: fffffa80c59978c8, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000000, value 0 = read operation, 1 = write operation
Arg4: fffff88001449d1b, address which referenced memory
Debugging Details:
------------------
READ_ADDRESS: GetPointerFromAddress: unable to read from fffff800030b6100
fffffa80c59978c8
CURRENT_IRQL: 2
FAULTING_IP:
ndis!ndisNsiGetAllInterfaceInformation+4a0
fffff880`01449d1b 48395850 cmp qword ptr [rax+50h],rbx
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT
BUGCHECK_STR: 0xD1
PROCESS_NAME: rundll32.exe
TRAP_FRAME: fffff88008af2240 -- (.trap 0xfffff88008af2240)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=fffffa80c5997878 rbx=0000000000000000 rcx=fffffa800d98a870
rdx=0000000000000000 rsi=0000000000000000 rdi=0000000000000000
rip=fffff88001449d1b rsp=fffff88008af23d0 rbp=fffff88008af2530
r8=fffff880014abb50 r9=0000000000000000 r10=fffffa800d98a870
r11=0000000000000000 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei pl nz na po nc
ndis!ndisNsiGetAllInterfaceInformation+0x4a0:
fffff880`01449d1b 48395850 cmp qword ptr [rax+50h],rbx ds:41a0:fffffa80`c59978c8=????????????????
Resetting default scope
LAST_CONTROL_TRANSFER: from fffff80002e842e9 to fffff80002e84d40
STACK_TEXT:
fffff880`08af20f8 fffff800`02e842e9 : 00000000`0000000a fffffa80`c59978c8 00000000`00000002 00000000`00000000 : nt!KeBugCheckEx
fffff880`08af2100 fffff800`02e82f60 : fffff8a0`03d77060 fffff880`08af24c0 00000000`00020019 00830000`00000000 : nt!KiBugCheckDispatch+0x69
fffff880`08af2240 fffff880`01449d1b : 00000000`00000000 00000000`00000000 00000000`00000000 00830000`00000000 : nt!KiPageFault+0x260
fffff880`08af23d0 fffff880`0153bf36 : fffff880`014aaa50 fffffa80`10897300 00000000`00000000 00000000`00000000 : ndis!ndisNsiGetAllInterfaceInformation+0x4a0
fffff880`08af2490 fffff880`03c9fe29 : fffffa80`10897370 fffff8a0`00000070 fffffa80`0cdf1740 00000000`00e1e220 : NETIO!NsiEnumerateObjectsAllParametersEx+0x6df
fffff880`08af2670 fffff880`03ca18e8 : fffffa80`0cdf1740 fffffa80`0cdf1670 00000000`00000000 fffffa80`0cdf16a8 : nsiproxy!NsippEnumerateObjectsAllParameters+0x305
fffff880`08af2860 fffff880`03ca19db : fffffa80`0e71d7f0 00000000`00000000 00000000`00000001 00000000`00000003 : nsiproxy!NsippDispatchDeviceControl+0x70
fffff880`08af28a0 fffff800`0319e7e7 : fffffa80`0d774310 fffffa80`0d774310 fffffa80`0cdf1788 fffffa80`0cdf1670 : nsiproxy!NsippDispatch+0x4b
fffff880`08af28d0 fffff800`0319f046 : 00000000`00e1e0a0 00000000`00000998 00000000`00000000 00000000`00000000 : nt!IopXxxControlFile+0x607
fffff880`08af2a00 fffff800`02e83fd3 : fffffa80`0cc0e660 00000000`00e1e088 fffff880`08af2a88 00000000`00000001 : nt!NtDeviceIoControlFile+0x56
fffff880`08af2a70 00000000`76de138a : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x13
00000000`00e1e118 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x76de138a
STACK_COMMAND: kb
FOLLOWUP_IP:
NETIO!NsiEnumerateObjectsAllParametersEx+6df
fffff880`0153bf36 3d1a000080 cmp eax,8000001Ah
SYMBOL_STACK_INDEX: 4
SYMBOL_NAME: NETIO!NsiEnumerateObjectsAllParametersEx+6df
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: NETIO
IMAGE_NAME: NETIO.SYS
DEBUG_FLR_IMAGE_TIMESTAMP: 4ce79381
FAILURE_BUCKET_ID: X64_0xD1_NETIO!NsiEnumerateObjectsAllParametersEx+6df
BUCKET_ID: X64_0xD1_NETIO!NsiEnumerateObjectsAllParametersEx+6df
Followup: MachineOwner
---------
-
Loading Dump File [D:\Kingston\BSODDmpFiles\onyxaj\Windows_NT6_BSOD_jcgriff2\032212-18189-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
Symbol search path is: SRV*C:\SymCache*http://msdl.microsoft.com/download/symbols
Executable search path is:
Windows 7 Kernel Version 7601 (Service Pack 1) MP (8 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS Personal
Built by: 7601.17727.amd64fre.win7sp1_gdr.111118-2330
Machine Name:
Kernel base = 0xfffff800`02e5c000 PsLoadedModuleList = 0xfffff800`030a0650
Debug session time: Thu Mar 22 17:01:07.800 2012 (UTC - 6:00)
System Uptime: 0 days 2:54:05.548
Loading Kernel Symbols
...............................................................
................................................................
.............
Loading User Symbols
Loading unloaded module list
.....
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
Use !analyze -v to get detailed debugging information.
BugCheck 50, {fffffa808f24ee00, 1, fffff88003d92ff0, 5}
Could not read faulting driver name
Probably caused by : dxgmms1.sys ( dxgmms1!VIDMM_GLOBAL::ReferenceAllocationForSubmission+a0 )
Followup: MachineOwner
---------
0: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
PAGE_FAULT_IN_NONPAGED_AREA (50)
Invalid system memory was referenced. This cannot be protected by try-except,
it must be protected by a Probe. Typically the address is just plain bad or it
is pointing at freed memory.
Arguments:
Arg1: fffffa808f24ee00, memory referenced.
Arg2: 0000000000000001, value 0 = read operation, 1 = write operation.
Arg3: fffff88003d92ff0, If non-zero, the instruction address which referenced the bad memory
address.
Arg4: 0000000000000005, (reserved)
Debugging Details:
------------------
Could not read faulting driver name
WRITE_ADDRESS: GetPointerFromAddress: unable to read from fffff8000310a100
fffffa808f24ee00
FAULTING_IP:
dxgmms1!VIDMM_GLOBAL::ReferenceAllocationForSubmission+a0
fffff880`03d92ff0 488908 mov qword ptr [rax],rcx
MM_INTERNAL_CODE: 5
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT
BUGCHECK_STR: 0x50
PROCESS_NAME: System
CURRENT_IRQL: 0
TRAP_FRAME: fffff88004bad600 -- (.trap 0xfffff88004bad600)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=fffffa808f24ee00 rbx=0000000000000000 rcx=fffffa80b51b44b0
rdx=fffff8a00868b5c0 rsi=0000000000000000 rdi=0000000000000000
rip=fffff88003d92ff0 rsp=fffff88004bad790 rbp=0000000000000000
r8=fffffa800d2e2d70 r9=0000000000000001 r10=0000000000000000
r11=fffffa800f8913e0 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei ng nz na po nc
dxgmms1!VIDMM_GLOBAL::ReferenceAllocationForSubmission+0xa0:
fffff880`03d92ff0 488908 mov qword ptr [rax],rcx ds:30e1:fffffa80`8f24ee00=????????????????
Resetting default scope
LAST_CONTROL_TRANSFER: from fffff80002e83c1f to fffff80002ed8d40
STACK_TEXT:
fffff880`04bad498 fffff800`02e83c1f : 00000000`00000050 fffffa80`8f24ee00 00000000`00000001 fffff880`04bad600 : nt!KeBugCheckEx
fffff880`04bad4a0 fffff800`02ed6e6e : 00000000`00000001 fffffa80`8f24ee00 00000000`00000000 fffff8a0`08e76290 : nt! ?? ::FNODOBFM::`string'+0x43d41
fffff880`04bad600 fffff880`03d92ff0 : fffff8a0`08579880 fffffa80`0d0a91c0 fffffa80`0f890000 fffffa80`0d0a9330 : nt!KiPageFault+0x16e
fffff880`04bad790 fffff880`03d908af : 00000000`00000000 fffffa80`0cbc2008 00000000`00000044 fffffa80`0d27a020 : dxgmms1!VIDMM_GLOBAL::ReferenceAllocationForSubmission+0xa0
fffff880`04bad7d0 fffff880`03daa65d : 00000000`00000000 fffff8a0`08e29450 fffffa80`00000000 fffffa80`0d0a9330 : dxgmms1!VIDMM_GLOBAL::PrepareDmaBuffer+0xe1b
fffff880`04bad9a0 fffff880`03daa398 : fffff800`00b96080 fffff880`03da9d00 fffffa80`00000000 fffffa80`00000000 : dxgmms1!VidSchiSubmitRenderCommand+0x241
fffff880`04badb90 fffff880`03da9e96 : 00000000`00000000 fffffa80`0cf9a830 00000000`00000080 fffffa80`0f825410 : dxgmms1!VidSchiSubmitQueueCommand+0x50
fffff880`04badbc0 fffff800`03172f7a : 00000000`02c667be fffffa80`0f30db60 fffffa80`0ca7d040 fffffa80`0f30db60 : dxgmms1!VidSchiWorkerThread+0xd6
fffff880`04badc00 fffff800`02ec99c6 : fffff800`0304de80 fffffa80`0f30db60 fffff800`0305bcc0 fffff880`01221384 : nt!PspSystemThreadStartup+0x5a
fffff880`04badc40 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KxStartSystemThread+0x16
STACK_COMMAND: kb
FOLLOWUP_IP:
dxgmms1!VIDMM_GLOBAL::ReferenceAllocationForSubmission+a0
fffff880`03d92ff0 488908 mov qword ptr [rax],rcx
SYMBOL_STACK_INDEX: 3
SYMBOL_NAME: dxgmms1!VIDMM_GLOBAL::ReferenceAllocationForSubmission+a0
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: dxgmms1
IMAGE_NAME: dxgmms1.sys
DEBUG_FLR_IMAGE_TIMESTAMP: 4ce799c1
FAILURE_BUCKET_ID: X64_0x50_dxgmms1!VIDMM_GLOBAL::ReferenceAllocationForSubmission+a0
BUCKET_ID: X64_0x50_dxgmms1!VIDMM_GLOBAL::ReferenceAllocationForSubmission+a0
Followup: MachineOwner
---------
- Usually caused by network adapter drivers being corrupted or out of date or by VPN software
- DirectX/Graphics Card related. Other possible causes include Memory problems... Graphics card memory problems... BIOS... Corrupted hard disk file system... Corrupted System Files... Missing Windows Updates... Antivirus Software... Drivers...
Do you have VPN software installed?
Are your network adapter drivers up to date? Realtek
Do the following for the DirectX/Graphics Card crash: