Microsoft (R) Windows Debugger Version 6.12.0002.633 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [F:\a\Minidump\D M P\DMP\012411-19141-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
Symbol search path is: SRV*c:\websymbols*http://msdl.microsoft.com/download/symbols
Executable search path is:
Windows 7 Kernel Version 7600 MP (4 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS Personal
Built by: 7600.16617.amd64fre.win7_gdr.100618-1621
Machine Name:
Kernel base = 0xfffff800`02c1f000 PsLoadedModuleList = 0xfffff800`02e5ce50
Debug session time: Mon Jan 24 15:54:56.439 2011 (UTC - 5:00)
System Uptime: 0 days 0:03:07.109
Loading Kernel Symbols
.
Press ctrl-c (cdb, kd, ntsd) or ctrl-break (windbg) to abort symbol loads that take too long.
Run !sym noisy before .reload to track down problems loading symbols.
..............................................................
................................................................
.....................
Loading User Symbols
Loading unloaded module list
....
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
Use !analyze -v to get detailed debugging information.
BugCheck 7A, {1, ffffffffc0000005, fffffa80071ea060, fffff68000012000}
Probably caused by : win32k.sys ( win32k!FreeView+a2 )
Followup: MachineOwner
---------
3: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
KERNEL_DATA_INPAGE_ERROR (7a)
The requested page of kernel data could not be read in. Typically caused by
a bad block in the paging file or disk controller error. Also see
KERNEL_STACK_INPAGE_ERROR.
If the error status is 0xC000000E, 0xC000009C, 0xC000009D or 0xC0000185,
it means the disk subsystem has experienced a failure.
If the error status is 0xC000009A, then it means the request failed because
a filesystem failed to make forward progress.
Arguments:
Arg1: 0000000000000001, lock type that was held (value 1,2,3, or PTE address)
Arg2: ffffffffc0000005, error status (normally i/o status code)
Arg3: fffffa80071ea060, current process (virtual address for lock type 3, or PTE)
Arg4: fffff68000012000, virtual address that could not be in-paged (or PTE contents if arg1 is a PTE address)
Debugging Details:
------------------
ERROR_CODE: (NTSTATUS) 0xc0000005 - The instruction at 0x%08lx referenced memory at 0x%08lx. The memory could not be %s.
BUGCHECK_STR: 0x7a_c0000005
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT
PROCESS_NAME: CCC.exe
CURRENT_IRQL: 0
LAST_CONTROL_TRANSFER: from fffff80002c35d28 to fffff80002c8f740
STACK_TEXT:
fffff880`0bb74208 fffff800`02c35d28 : 00000000`0000007a 00000000`00000001 ffffffff`c0000005 fffffa80`071ea060 : nt!KeBugCheckEx
fffff880`0bb74210 fffff800`02cc0964 : 00000000`02400000 fffff6fb`7da00000 fffff680`00012000 9c500001`dca77025 : nt! ?? ::FNODOBFM::`string'+0x2ee03
fffff880`0bb74270 fffff800`02cc2df9 : 00000000`00000000 00000000`0275ffff 00000000`00000000 00000000`00000000 : nt!MiDeleteVirtualAddresses+0x9eb
fffff880`0bb74430 fffff800`02fa81d0 : fffffa80`071b4a30 0007ffff`00000000 00000000`00000000 00000000`00000000 : nt!MiRemoveMappedView+0xd9
fffff880`0bb74550 fffff960`0018c192 : 00000000`00000000 fffff900`c2cad920 00000000`00000001 00000000`00000000 : nt!MiUnmapViewOfSection+0x1b0
fffff880`0bb74610 fffff960`00189f73 : fffff880`0bb74730 fffff960`00189f08 00000000`00000001 fffff960`001895f8 : win32k!FreeView+0xa2
fffff880`0bb74680 fffff800`02f3665c : 00000000`00000000 fffffa80`098b2990 00000000`00000001 00000000`00000001 : win32k!UnmapDesktop+0x6b
fffff880`0bb746b0 fffff800`02f4be87 : 00000000`00000000 fffffa80`071ea060 fffffa80`098b2990 fffffa80`06d6e3f0 : nt!ExpWin32SessionCallout+0x5c
fffff880`0bb74710 fffff800`02f8ba24 : fffff900`c1f19630 00000000`00000000 00000000`00000000 00000000`00000000 : nt!ExpWin32CloseProcedure+0x53
fffff880`0bb74760 fffff800`02fa5501 : fffffa80`071ea060 fffffa80`00000001 fffff8a0`021fc7a0 00000000`00000000 : nt!ObpDecrementHandleCount+0xb4
fffff880`0bb747e0 fffff800`02fa5414 : 00000000`00000038 fffffa80`071ea060 fffff8a0`021fc7a0 00000000`00000038 : nt!ObpCloseHandleTableEntry+0xb1
fffff880`0bb74870 fffff960`0018d283 : 00000000`00000038 00000000`00004000 00000000`00000000 fffff960`00188f23 : nt!ObpCloseHandle+0x94
fffff880`0bb748c0 fffff960`0018421f : fffff900`c1f13300 fffff880`0bb74c20 00000000`ffffffff fffffa80`071ea060 : win32k!DestroyProcessInfo+0x327
fffff880`0bb748f0 fffff960`0018431a : fffffa80`0992a000 fffff900`c1f13300 fffffa80`07084b60 fffff800`02c6f00e : win32k!xxxUserProcessCallout+0x15f
fffff880`0bb74940 fffff800`02f74a01 : fffffa80`0992a090 00000000`00000000 00000000`00000000 fffffa80`07084b60 : win32k!W32pProcessCallout+0x4e
fffff880`0bb74970 fffff800`02f4d635 : 00000000`ffffffff 00000000`00000001 fffffa80`78457300 00000000`00000000 : nt!PspExitThread+0x561
fffff880`0bb74a30 fffff800`02c6c1db : 000007fe`f0e114a4 fffffa80`07084b60 ffffffff`ffffffff 00000000`00000000 : nt!PsExitSpecialApc+0x1d
fffff880`0bb74a60 fffff800`02c6c620 : 000007fe`f0a10000 fffff880`0bb74ae0 fffff800`02f4d74c 00000000`00000001 : nt!KiDeliverApc+0x2eb
fffff880`0bb74ae0 fffff800`02c8d974 : 00000000`00000000 000007fe`f0a10000 00000000`00da7a01 fffffa80`00008000 : nt!KiInitiateUserApc+0x70
fffff880`0bb74c20 000007fe`f4b98158 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiPageFault+0x2b4
00000000`1d9fab50 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x7fe`f4b98158
STACK_COMMAND: kb
FOLLOWUP_IP:
win32k!FreeView+a2
fffff960`0018c192 488b06 mov rax,qword ptr [rsi]
SYMBOL_STACK_INDEX: 5
SYMBOL_NAME: win32k!FreeView+a2
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: win32k
IMAGE_NAME: win32k.sys
DEBUG_FLR_IMAGE_TIMESTAMP: 4cbe5d3e
FAILURE_BUCKET_ID: X64_0x7a_c0000005_win32k!FreeView+a2
BUCKET_ID: X64_0x7a_c0000005_win32k!FreeView+a2
Followup: MachineOwner
---------