While playing bfbc2, I have been encountering BSOD's with code 7E which originate from dxgmms1.sys. I suspect something is awry with my memory, and I have replacements on order, but I was curious if others looking at the bugcheck analysis come to the same conclusion:
"ERROR_CODE: (NTSTATUS) 0xc0000005 - The instruction at 0x%08lx referenced memory at 0x%08lx. The memory could not be %s."
Diagnostic Checks Thus Far
HDD: Ran Seatools short and long tests - Passed
VIDEO: Replaced video card
MEM: Discovered 1/4 bad stick(s)/memtest86+, removed 2 & retained other two.
OS: Reinstalled several times
BIOS: OC'd or not, I still encounter this and other errors like PFN_LIST_CORRUPT
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
Use !analyze -v to get detailed debugging information.
BugCheck 1000007E, {ffffffffc0000005, fffff880041cad0c, fffff88003d68868, fffff88003d680d0}
Probably caused by : dxgmms1.sys ( dxgmms1!VIDMM_SEGMENT::MarkResourcesForEviction+94 )
Followup: MachineOwner
---------
1: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
SYSTEM_THREAD_EXCEPTION_NOT_HANDLED_M (1000007e)
This is a very common bugcheck. Usually the exception address pinpoints
the driver/function that caused the problem. Always note this address
as well as the link date of the driver/image that contains this address.
Some common problems are exception code 0x80000003. This means a hard
coded breakpoint or assertion was hit, but this system was booted
/NODEBUG. This is not supposed to happen as developers should never have
hardcoded breakpoints in retail code, but ...
If this happens, make sure a debugger gets connected, and the
system is booted /DEBUG. This will let us see why this breakpoint is
happening.
Arguments:
Arg1: ffffffffc0000005, The exception code that was not handled
Arg2: fffff880041cad0c, The address that the exception occurred at
Arg3: fffff88003d68868, Exception Record Address
Arg4: fffff88003d680d0, Context Record Address
Debugging Details:
------------------
EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - The instruction at 0x%08lx referenced memory at 0x%08lx. The memory could not be %s.
FAULTING_IP:
dxgmms1!VIDMM_SEGMENT::MarkResourcesForEviction+94
fffff880`041cad0c 488908 mov qword ptr [rax],rcx
EXCEPTION_RECORD: fffff88003d68868 -- (.exr 0xfffff88003d68868)
ExceptionAddress: fffff880041cad0c (dxgmms1!VIDMM_SEGMENT::MarkResourcesForEviction+0x0000000000000094)
ExceptionCode: c0000005 (Access violation)
ExceptionFlags: 00000000
NumberParameters: 2
Parameter[0]: 0000000000000001
Parameter[1]: 0000000000000000
Attempt to write to address 0000000000000000
CONTEXT: fffff88003d680d0 -- (.cxr 0xfffff88003d680d0)
rax=0000000000000000 rbx=fffff8a00cc0a500 rcx=0000000000000ac0
rdx=fffff8a00cf5fa70 rsi=fffff8a00cf5fa70 rdi=fffffa80073da650
rip=fffff880041cad0c rsp=fffff88003d68aa0 rbp=fffffa80073da540
r8=fffff88003d68b08 r9=fffff88003d68b10 r10=000000000000004f
r11=fffff8a00b2943b0 r12=0000000000000000 r13=fffff8a00cc0a4e0
r14=0000000000000000 r15=fffff88003d68ca0
iopl=0 nv up ei pl nz ac po nc
cs=0010 ss=0018 ds=002b es=002b fs=0053 gs=002b efl=00010216
dxgmms1!VIDMM_SEGMENT::MarkResourcesForEviction+0x94:
fffff880`041cad0c 488908 mov qword ptr [rax],rcx ds:002b:00000000`00000000=????????????????
Resetting default scope
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: NULL_DEREFERENCE
PROCESS_NAME: System
CURRENT_IRQL: 0
ERROR_CODE: (NTSTATUS) 0xc0000005 - The instruction at 0x%08lx referenced memory at 0x%08lx. The memory could not be %s.
EXCEPTION_PARAMETER1: 0000000000000001
EXCEPTION_PARAMETER2: 0000000000000000
WRITE_ADDRESS: GetPointerFromAddress: unable to read from fffff80002d0b0e0
0000000000000000
FOLLOWUP_IP:
dxgmms1!VIDMM_SEGMENT::MarkResourcesForEviction+94
fffff880`041cad0c 488908 mov qword ptr [rax],rcx
BUGCHECK_STR: 0x7E
LAST_CONTROL_TRANSFER: from fffff880041ba5e1 to fffff880041cad0c
STACK_TEXT:
fffff880`03d68aa0 fffff880`041ba5e1 : fffffa80`073db000 00000000`00000000 00000000`00000000 fffffa80`073d3000 : dxgmms1!VIDMM_SEGMENT::MarkResourcesForEviction+0x94
fffff880`03d68b00 fffff880`041b8e13 : fffff8a0`0cf5fa70 fffffa80`073db000 fffffa80`047dec20 fffffa80`073db000 : dxgmms1!VIDMM_GLOBAL::NotifyAllocationEviction+0x59
fffff880`03d68b30 fffff880`041b4358 : fffffa80`046ea040 00000000`00000080 00000000`00000000 fffff880`03d68ca0 : dxgmms1!VIDMM_GLOBAL:
rocessDeferredCommand+0x523
fffff880`03d68c50 fffff880`041d216d : fffffa80`00000000 fffffa80`07397010 00000000`0000000f fffff880`041d3f09 : dxgmms1!VidMmiProcessTerminationCommand+0x4c
fffff880`03d68ca0 fffff880`041d13f8 : fffff880`009ecf40 fffffa80`0762c1f0 00000000`00000000 fffffa80`07397010 : dxgmms1!VidSchiSubmitDeviceCommand+0x39
fffff880`03d68cd0 fffff880`041d0e96 : 00000000`00000000 fffffa80`0762c1f0 00000000`00000080 fffffa80`07397010 : dxgmms1!VidSchiSubmitQueueCommand+0xb0
fffff880`03d68d00 fffff800`02d78a86 : 00000000`039c6da0 fffffa80`073daa10 fffffa80`03968890 fffffa80`073daa10 : dxgmms1!VidSchiWorkerThread+0xd6
fffff880`03d68d40 fffff800`02ab1b06 : fffff880`009e8180 fffffa80`073daa10 fffff880`009f2fc0 fffff880`01214534 : nt!PspSystemThreadStartup+0x5a
fffff880`03d68d80 00000000`00000000 : fffff880`03d69000 fffff880`03d63000 fffff880`03d68690 00000000`00000000 : nt!KxStartSystemThread+0x16
SYMBOL_STACK_INDEX: 0
SYMBOL_NAME: dxgmms1!VIDMM_SEGMENT::MarkResourcesForEviction+94
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: dxgmms1
IMAGE_NAME: dxgmms1.sys
DEBUG_FLR_IMAGE_TIMESTAMP: 4a5bc578
STACK_COMMAND: .cxr 0xfffff88003d680d0 ; kb
FAILURE_BUCKET_ID: X64_0x7E_dxgmms1!VIDMM_SEGMENT::MarkResourcesForEviction+94
BUCKET_ID: X64_0x7E_dxgmms1!VIDMM_SEGMENT::MarkResourcesForEviction+94
Followup: MachineOwner
---------
"ERROR_CODE: (NTSTATUS) 0xc0000005 - The instruction at 0x%08lx referenced memory at 0x%08lx. The memory could not be %s."
Diagnostic Checks Thus Far
HDD: Ran Seatools short and long tests - Passed
VIDEO: Replaced video card
MEM: Discovered 1/4 bad stick(s)/memtest86+, removed 2 & retained other two.
OS: Reinstalled several times
BIOS: OC'd or not, I still encounter this and other errors like PFN_LIST_CORRUPT
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
Use !analyze -v to get detailed debugging information.
BugCheck 1000007E, {ffffffffc0000005, fffff880041cad0c, fffff88003d68868, fffff88003d680d0}
Probably caused by : dxgmms1.sys ( dxgmms1!VIDMM_SEGMENT::MarkResourcesForEviction+94 )
Followup: MachineOwner
---------
1: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
SYSTEM_THREAD_EXCEPTION_NOT_HANDLED_M (1000007e)
This is a very common bugcheck. Usually the exception address pinpoints
the driver/function that caused the problem. Always note this address
as well as the link date of the driver/image that contains this address.
Some common problems are exception code 0x80000003. This means a hard
coded breakpoint or assertion was hit, but this system was booted
/NODEBUG. This is not supposed to happen as developers should never have
hardcoded breakpoints in retail code, but ...
If this happens, make sure a debugger gets connected, and the
system is booted /DEBUG. This will let us see why this breakpoint is
happening.
Arguments:
Arg1: ffffffffc0000005, The exception code that was not handled
Arg2: fffff880041cad0c, The address that the exception occurred at
Arg3: fffff88003d68868, Exception Record Address
Arg4: fffff88003d680d0, Context Record Address
Debugging Details:
------------------
EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - The instruction at 0x%08lx referenced memory at 0x%08lx. The memory could not be %s.
FAULTING_IP:
dxgmms1!VIDMM_SEGMENT::MarkResourcesForEviction+94
fffff880`041cad0c 488908 mov qword ptr [rax],rcx
EXCEPTION_RECORD: fffff88003d68868 -- (.exr 0xfffff88003d68868)
ExceptionAddress: fffff880041cad0c (dxgmms1!VIDMM_SEGMENT::MarkResourcesForEviction+0x0000000000000094)
ExceptionCode: c0000005 (Access violation)
ExceptionFlags: 00000000
NumberParameters: 2
Parameter[0]: 0000000000000001
Parameter[1]: 0000000000000000
Attempt to write to address 0000000000000000
CONTEXT: fffff88003d680d0 -- (.cxr 0xfffff88003d680d0)
rax=0000000000000000 rbx=fffff8a00cc0a500 rcx=0000000000000ac0
rdx=fffff8a00cf5fa70 rsi=fffff8a00cf5fa70 rdi=fffffa80073da650
rip=fffff880041cad0c rsp=fffff88003d68aa0 rbp=fffffa80073da540
r8=fffff88003d68b08 r9=fffff88003d68b10 r10=000000000000004f
r11=fffff8a00b2943b0 r12=0000000000000000 r13=fffff8a00cc0a4e0
r14=0000000000000000 r15=fffff88003d68ca0
iopl=0 nv up ei pl nz ac po nc
cs=0010 ss=0018 ds=002b es=002b fs=0053 gs=002b efl=00010216
dxgmms1!VIDMM_SEGMENT::MarkResourcesForEviction+0x94:
fffff880`041cad0c 488908 mov qword ptr [rax],rcx ds:002b:00000000`00000000=????????????????
Resetting default scope
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: NULL_DEREFERENCE
PROCESS_NAME: System
CURRENT_IRQL: 0
ERROR_CODE: (NTSTATUS) 0xc0000005 - The instruction at 0x%08lx referenced memory at 0x%08lx. The memory could not be %s.
EXCEPTION_PARAMETER1: 0000000000000001
EXCEPTION_PARAMETER2: 0000000000000000
WRITE_ADDRESS: GetPointerFromAddress: unable to read from fffff80002d0b0e0
0000000000000000
FOLLOWUP_IP:
dxgmms1!VIDMM_SEGMENT::MarkResourcesForEviction+94
fffff880`041cad0c 488908 mov qword ptr [rax],rcx
BUGCHECK_STR: 0x7E
LAST_CONTROL_TRANSFER: from fffff880041ba5e1 to fffff880041cad0c
STACK_TEXT:
fffff880`03d68aa0 fffff880`041ba5e1 : fffffa80`073db000 00000000`00000000 00000000`00000000 fffffa80`073d3000 : dxgmms1!VIDMM_SEGMENT::MarkResourcesForEviction+0x94
fffff880`03d68b00 fffff880`041b8e13 : fffff8a0`0cf5fa70 fffffa80`073db000 fffffa80`047dec20 fffffa80`073db000 : dxgmms1!VIDMM_GLOBAL::NotifyAllocationEviction+0x59
fffff880`03d68b30 fffff880`041b4358 : fffffa80`046ea040 00000000`00000080 00000000`00000000 fffff880`03d68ca0 : dxgmms1!VIDMM_GLOBAL:
fffff880`03d68c50 fffff880`041d216d : fffffa80`00000000 fffffa80`07397010 00000000`0000000f fffff880`041d3f09 : dxgmms1!VidMmiProcessTerminationCommand+0x4c
fffff880`03d68ca0 fffff880`041d13f8 : fffff880`009ecf40 fffffa80`0762c1f0 00000000`00000000 fffffa80`07397010 : dxgmms1!VidSchiSubmitDeviceCommand+0x39
fffff880`03d68cd0 fffff880`041d0e96 : 00000000`00000000 fffffa80`0762c1f0 00000000`00000080 fffffa80`07397010 : dxgmms1!VidSchiSubmitQueueCommand+0xb0
fffff880`03d68d00 fffff800`02d78a86 : 00000000`039c6da0 fffffa80`073daa10 fffffa80`03968890 fffffa80`073daa10 : dxgmms1!VidSchiWorkerThread+0xd6
fffff880`03d68d40 fffff800`02ab1b06 : fffff880`009e8180 fffffa80`073daa10 fffff880`009f2fc0 fffff880`01214534 : nt!PspSystemThreadStartup+0x5a
fffff880`03d68d80 00000000`00000000 : fffff880`03d69000 fffff880`03d63000 fffff880`03d68690 00000000`00000000 : nt!KxStartSystemThread+0x16
SYMBOL_STACK_INDEX: 0
SYMBOL_NAME: dxgmms1!VIDMM_SEGMENT::MarkResourcesForEviction+94
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: dxgmms1
IMAGE_NAME: dxgmms1.sys
DEBUG_FLR_IMAGE_TIMESTAMP: 4a5bc578
STACK_COMMAND: .cxr 0xfffff88003d680d0 ; kb
FAILURE_BUCKET_ID: X64_0x7E_dxgmms1!VIDMM_SEGMENT::MarkResourcesForEviction+94
BUCKET_ID: X64_0x7E_dxgmms1!VIDMM_SEGMENT::MarkResourcesForEviction+94
Followup: MachineOwner
---------
Last edited: