This is a very common bugcheck. Usually the exception address pinpoints
the driver/function that caused the problem. Always note this address
as well as the link date of the driver/image that contains this address.
Some common problems are exception code 0x80000003. This means a hard
coded breakpoint or assertion was hit, but this system was booted
/NODEBUG. This is not supposed to happen as developers should never have
hardcoded breakpoints in retail code, but ...
If this happens, make sure a debugger gets connected, and the
system is booted /DEBUG. This will let us see why this breakpoint is
happening.
Arguments:
Arg1: ffffffffc0000005, The exception code that was not handled
Arg2: fffff80181054574, The address that the exception occurred at
Arg3: ffffd00020d5e588, Exception Record Address
Arg4: ffffd00020d5dd90, Context Record Address
Debugging Details:
------------------
EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - The instruction at 0x%08lx referenced memory at 0x%08lx. The memory could not be %s.
FAULTING_IP:
dxgmms1!VIDMM_GLOBAL::ReferenceAllocationForPreparation+1a4
fffff801`81054574 8b4810 mov ecx,dword ptr [rax+10h]
EXCEPTION_RECORD: ffffd00020d5e588 -- (.exr 0xffffd00020d5e588)
ExceptionAddress: fffff80181054574 (dxgmms1!VIDMM_GLOBAL::ReferenceAllocationForPreparation+0x00000000000001a4)
ExceptionCode: c0000005 (Access violation)
ExceptionFlags: 00000000
NumberParameters: 2
Parameter[0]: 0000000000000000
Parameter[1]: ffffffffffffffff
Attempt to read from address ffffffffffffffff
CONTEXT: ffffd00020d5dd90 -- (.cxr 0xffffd00020d5dd90;r)
rax=0008000000000000 rbx=ffffc0005aed9db0 rcx=00000000fffffffe
rdx=ffffe00163290800 rsi=0000000000000001 rdi=ffffe00163290800
rip=fffff80181054574 rsp=ffffd00020d5e7c0 rbp=0000000000000000
r8=0000000000000001 r9=0000000000000000 r10=ffffe001619bb000
r11=000000000000001f r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=ffffe00161b7e000
iopl=0 nv up ei pl nz na po nc
cs=0010 ss=0000 ds=002b es=002b fs=0053 gs=002b efl=00010206
dxgmms1!VIDMM_GLOBAL::ReferenceAllocationForPreparation+0x1a4:
fffff801`81054574 8b4810 mov ecx,dword ptr [rax+10h] ds:002b:00080000`00000010=????????
Last set context:
rax=0008000000000000 rbx=ffffc0005aed9db0 rcx=00000000fffffffe
rdx=ffffe00163290800 rsi=0000000000000001 rdi=ffffe00163290800
rip=fffff80181054574 rsp=ffffd00020d5e7c0 rbp=0000000000000000
r8=0000000000000001 r9=0000000000000000 r10=ffffe001619bb000
r11=000000000000001f r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=ffffe00161b7e000
iopl=0 nv up ei pl nz na po nc
cs=0010 ss=0000 ds=002b es=002b fs=0053 gs=002b efl=00010206
dxgmms1!VIDMM_GLOBAL::ReferenceAllocationForPreparation+0x1a4:
fffff801`81054574 8b4810 mov ecx,dword ptr [rax+10h] ds:002b:00080000`00000010=????????
Resetting default scope
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: WIN8_DRIVER_FAULT
PROCESS_NAME: System
CURRENT_IRQL: 0
ERROR_CODE: (NTSTATUS) 0xc0000005 - The instruction at 0x%08lx referenced memory at 0x%08lx. The memory could not be %s.
EXCEPTION_PARAMETER1: 0000000000000000
EXCEPTION_PARAMETER2: ffffffffffffffff
READ_ADDRESS: ffffffffffffffff
FOLLOWUP_IP:
dxgmms1!VIDMM_GLOBAL::ReferenceAllocationForPreparation+1a4
fffff801`81054574 8b4810 mov ecx,dword ptr [rax+10h]
BUGCHECK_STR: AV
ANALYSIS_VERSION: 6.3.9600.17029 (debuggers(dbg).140219-1702) amd64fre
LAST_CONTROL_TRANSFER: from fffff801810533c3 to fffff80181054574
STACK_TEXT:
ffffd000`20d5e7c0 fffff801`810533c3 : ffffe001`5f506088 ffffd000`20d5e910 00000000`0000000e ffff05bd`ecb04bbb : dxgmms1!VIDMM_GLOBAL::ReferenceAllocationForPreparation+0x1a4
ffffd000`20d5e810 fffff801`8105da6a : ffffe001`619b5880 ffffe001`619bb000 ffffe001`602f8cc0 ffffe001`619b5010 : dxgmms1!VIDMM_GLOBAL:

repareDmaBuffer+0x443
ffffd000`20d5ea90 fffff801`8105fda5 : ffffe001`00000000 ffffe001`00000000 ffffe001`62c3ac70 ffffe001`00000000 : dxgmms1!VidSchiSubmitRenderCommand+0x20a
ffffd000`20d5ec70 fffff801`8105fd1d : ffffe001`619bb000 00000000`00000080 ffffe001`619e3500 ffffe001`00000000 : dxgmms1!VidSchiRun_PriorityTable+0x85
ffffd000`20d5ecc0 fffff802`c8144794 : fffff802`c83c2a00 ffffe001`619e3500 ffffd000`20d5ed90 fffff802`c81cc37d : dxgmms1!VidSchiWorkerThread+0x8d
ffffd000`20d5ed00 fffff802`c81cf5c6 : fffff802`c835b180 ffffe001`619e3500 fffff802`c83c2a00 ffffe001`5f1aa710 : nt!PspSystemThreadStartup+0x58
ffffd000`20d5ed60 00000000`00000000 : ffffd000`20d5f000 ffffd000`20d59000 00000000`00000000 00000000`00000000 : nt!KiStartSystemThread+0x16
SYMBOL_STACK_INDEX: 0
SYMBOL_NAME: dxgmms1!VIDMM_GLOBAL::ReferenceAllocationForPreparation+1a4
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: dxgmms1
IMAGE_NAME: dxgmms1.sys
DEBUG_FLR_IMAGE_TIMESTAMP: 53183e46
IMAGE_VERSION: 6.3.9600.17041
STACK_COMMAND: .cxr 0xffffd00020d5dd90 ; kb
BUCKET_ID_FUNC_OFFSET: 1a4
FAILURE_BUCKET_ID: AV_dxgmms1!VIDMM_GLOBAL::ReferenceAllocationForPreparation
BUCKET_ID: AV_dxgmms1!VIDMM_GLOBAL::ReferenceAllocationForPreparation
ANALYSIS_SOURCE: KM
FAILURE_ID_HASH_STRING: km:av_dxgmms1!vidmm_global::referenceallocationforpreparation
FAILURE_ID_HASH: {eef1921e-cdce-0263-9e71-094ac58a4229}
Followup: MachineOwner