Microsoft (R) Windows Debugger Version 6.12.0002.633 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [F:\a\Minidump\D M P\DMP\022611-13665-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
Symbol search path is: SRV*c:\websymbols*http://msdl.microsoft.com/download/symbols
Executable search path is:
Windows 7 Kernel Version 7600 MP (4 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS
Built by: 7600.16617.amd64fre.win7_gdr.100618-1621
Machine Name:
Kernel base = 0xfffff800`02a61000 PsLoadedModuleList = 0xfffff800`02c9ee50
Debug session time: Sat Feb 26 13:48:33.141 2011 (UTC - 5:00)
System Uptime: 0 days 1:30:34.920
Loading Kernel Symbols
...............................................................
................................................................
....................
Loading User Symbols
Loading unloaded module list
.......
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
Use !analyze -v to get detailed debugging information.
BugCheck 3B, {c0000005, fffff88004545954, fffff88002ad9d60, 0}
Probably caused by : dxgmms1.sys ( dxgmms1!VidMmDestroyAllocation+14 )
Followup: MachineOwner
---------
0: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
SYSTEM_SERVICE_EXCEPTION (3b)
An exception happened while executing a system service routine.
Arguments:
Arg1: 00000000c0000005, Exception code that caused the bugcheck
Arg2: fffff88004545954, Address of the instruction which caused the bugcheck
Arg3: fffff88002ad9d60, Address of the context record for the exception that caused the bugcheck
Arg4: 0000000000000000, zero.
Debugging Details:
------------------
EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - The instruction at 0x%08lx referenced memory at 0x%08lx. The memory could not be %s.
FAULTING_IP:
dxgmms1!VidMmDestroyAllocation+14
fffff880`04545954 488b3a mov rdi,qword ptr [rdx]
CONTEXT: fffff88002ad9d60 -- (.cxr 0xfffff88002ad9d60)
rax=fffff880045558d0 rbx=0000000000000000 rcx=fffff8a001cdef10
rdx=300fa90080152408 rsi=fffff8a00866e000 rdi=0000000000000000
rip=fffff88004545954 rsp=fffff88002ada730 rbp=0000000000000000
r8=0000000000000000 r9=0000000000000000 r10=0000000000000000
r11=fffff8800142b120 r12=fffff8a002a2e740 r13=fffff8a007c59960
r14=0000000000000001 r15=0000000000000000
iopl=0 nv up ei ng nz na po nc
cs=0010 ss=0018 ds=002b es=002b fs=0053 gs=002b efl=00010286
dxgmms1!VidMmDestroyAllocation+0x14:
fffff880`04545954 488b3a mov rdi,qword ptr [rdx] ds:002b:300fa900`80152408=????????????????
Resetting default scope
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT
BUGCHECK_STR: 0x3B
PROCESS_NAME: Client.exe
CURRENT_IRQL: 0
LAST_CONTROL_TRANSFER: from 0000000000000000 to fffff88004545954
STACK_TEXT:
fffff880`02ada730 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : dxgmms1!VidMmDestroyAllocation+0x14
FOLLOWUP_IP:
dxgmms1!VidMmDestroyAllocation+14
fffff880`04545954 488b3a mov rdi,qword ptr [rdx]
SYMBOL_STACK_INDEX: 0
SYMBOL_NAME: dxgmms1!VidMmDestroyAllocation+14
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: dxgmms1
IMAGE_NAME: dxgmms1.sys
DEBUG_FLR_IMAGE_TIMESTAMP: 4a5bc578
STACK_COMMAND: .cxr 0xfffff88002ad9d60 ; kb
FAILURE_BUCKET_ID: X64_0x3B_dxgmms1!VidMmDestroyAllocation+14
BUCKET_ID: X64_0x3B_dxgmms1!VidMmDestroyAllocation+14
Followup: MachineOwner
---------
Microsoft (R) Windows Debugger Version 6.12.0002.633 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [F:\a\Minidump\D M P\DMP\022511-15210-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
Symbol search path is: SRV*c:\websymbols*http://msdl.microsoft.com/download/symbols
Executable search path is:
Windows 7 Kernel Version 7600 MP (4 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS
Built by: 7600.16617.amd64fre.win7_gdr.100618-1621
Machine Name:
Kernel base = 0xfffff800`02a51000 PsLoadedModuleList = 0xfffff800`02c8ee50
Debug session time: Fri Feb 25 13:31:24.248 2011 (UTC - 5:00)
System Uptime: 0 days 3:18:32.340
Loading Kernel Symbols
...............................................................
................................................................
.....................
Loading User Symbols
Loading unloaded module list
.....
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
Use !analyze -v to get detailed debugging information.
BugCheck 4E, {99, 9976e, 2, 10426d}
Probably caused by : memory_corruption ( nt!MiBadShareCount+4c )
Followup: MachineOwner
---------
2: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
PFN_LIST_CORRUPT (4e)
Typically caused by drivers passing bad memory descriptor lists (ie: calling
MmUnlockPages twice with the same list, etc). If a kernel debugger is
available get the stack trace.
Arguments:
Arg1: 0000000000000099, A PTE or PFN is corrupt
Arg2: 000000000009976e, page frame number
Arg3: 0000000000000002, current page state
Arg4: 000000000010426d, 0
Debugging Details:
------------------
BUGCHECK_STR: 0x4E_99
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT
PROCESS_NAME: chrome.exe
CURRENT_IRQL: 2
LAST_CONTROL_TRANSFER: from fffff80002b5138c to fffff80002ac1740
STACK_TEXT:
fffff880`03a86f98 fffff800`02b5138c : 00000000`0000004e 00000000`00000099 00000000`0009976e 00000000`00000002 : nt!KeBugCheckEx
fffff880`03a86fa0 fffff800`02b339e5 : 00000000`00000000 fffff680`00029718 00000000`00000002 00000000`00000001 : nt!MiBadShareCount+0x4c
fffff880`03a86fe0 fffff800`02a95c23 : fffffa80`04ce18d0 fffff700`00003c4d 0000007f`fffffff8 fffff8a0`0996b210 : nt! ?? ::FNODOBFM::`string'+0x3222c
fffff880`03a87070 fffff800`02a9468a : fffffa80`04ce18d0 fffffa80`00000000 fffff880`00002d28 fffff800`00000000 : nt!MiDeleteAddressesInWorkingSet+0x307
fffff880`03a87920 fffff800`02da6dcf : fffff8a0`091f0060 fffff880`03a87c20 00000000`00000000 fffffa80`04365680 : nt!MmCleanProcessAddressSpace+0x96
fffff880`03a87970 fffff800`02d7f635 : 00000000`00000000 00000000`00000001 00000000`7ef9d000 fffffa80`047bfb60 : nt!PspExitThread+0x92f
fffff880`03a87a30 fffff800`02a9e1db : 00000000`00000000 fffffa80`049bf580 00000000`01abe620 00000000`00000000 : nt!PsExitSpecialApc+0x1d
fffff880`03a87a60 fffff800`02a9e620 : 00000000`021ff7c8 fffff880`03a87ae0 fffff800`02d7f74c 00000000`00000001 : nt!KiDeliverApc+0x2eb
fffff880`03a87ae0 fffff800`02ac0a37 : fffffa80`04365680 00000000`7ef9d000 00000000`000000c0 00000000`73d2a2bc : nt!KiInitiateUserApc+0x70
fffff880`03a87c20 00000000`773c17ba : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceExit+0x9c
00000000`01abe5f8 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x773c17ba
STACK_COMMAND: kb
FOLLOWUP_IP:
nt!MiBadShareCount+4c
fffff800`02b5138c cc int 3
SYMBOL_STACK_INDEX: 1
SYMBOL_NAME: nt!MiBadShareCount+4c
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: nt
DEBUG_FLR_IMAGE_TIMESTAMP: 4c1c44a9
IMAGE_NAME: memory_corruption
FAILURE_BUCKET_ID: X64_0x4E_99_nt!MiBadShareCount+4c
BUCKET_ID: X64_0x4E_99_nt!MiBadShareCount+4c
Followup: MachineOwner
---------
Microsoft (R) Windows Debugger Version 6.12.0002.633 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [F:\a\Minidump\D M P\DMP\022611-15085-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
Symbol search path is: SRV*c:\websymbols*http://msdl.microsoft.com/download/symbols
Executable search path is:
Windows 7 Kernel Version 7600 MP (4 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS
Built by: 7600.16617.amd64fre.win7_gdr.100618-1621
Machine Name:
Kernel base = 0xfffff800`02a5f000 PsLoadedModuleList = 0xfffff800`02c9ce50
Debug session time: Sat Feb 26 12:08:18.141 2011 (UTC - 5:00)
System Uptime: 0 days 0:10:08.232
Loading Kernel Symbols
...............................................................
................................................................
......................
Loading User Symbols
Loading unloaded module list
.....
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
Use !analyze -v to get detailed debugging information.
BugCheck 1A, {41201, fffff6800012b990, f1500000ba519847, fffffa8003f21c40}
Probably caused by : ntkrnlmp.exe ( nt! ?? ::FNODOBFM::`string'+13bb2 )
Followup: MachineOwner
---------
2: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
MEMORY_MANAGEMENT (1a)
# Any other values for parameter 1 must be individually examined.
Arguments:
Arg1: 0000000000041201, The subtype of the bugcheck.
Arg2: fffff6800012b990
Arg3: f1500000ba519847
Arg4: fffffa8003f21c40
Debugging Details:
------------------
BUGCHECK_STR: 0x1a_41201
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT
PROCESS_NAME: Client.exe
CURRENT_IRQL: 0
LAST_CONTROL_TRANSFER: from fffff80002b2db3e to fffff80002acf740
STACK_TEXT:
fffff880`085e49b8 fffff800`02b2db3e : 00000000`0000001a 00000000`00041201 fffff680`0012b990 f1500000`ba519847 : nt!KeBugCheckEx
fffff880`085e49c0 fffff800`02a9db6e : 00000000`00000000 00000000`00000000 00000000`00000000 f1500000`ba519847 : nt! ?? ::FNODOBFM::`string'+0x13bb2
fffff880`085e4a00 fffff800`02a9d80a : fffffa80`03f21c40 fffffa80`03ed8b30 fffffa80`03ed8b30 00000000`25732000 : nt!MiQueryAddressState+0x2ae
fffff880`085e4a50 fffff800`02db6c38 : fffff880`00000004 00000000`25733000 fffffa80`03f21c40 fffff880`085e4bc0 : nt!MiQueryAddressSpan+0xaa
fffff880`085e4ac0 fffff800`02ace993 : ffffffff`ffffffff fffffa80`03de5b60 00000000`0000008a 00000000`0d3ae798 : nt!NtQueryVirtualMemory+0x386
fffff880`085e4bb0 00000000`775c00ea : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x13
00000000`0d3ae778 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x775c00ea
STACK_COMMAND: kb
FOLLOWUP_IP:
nt! ?? ::FNODOBFM::`string'+13bb2
fffff800`02b2db3e cc int 3
SYMBOL_STACK_INDEX: 1
SYMBOL_NAME: nt! ?? ::FNODOBFM::`string'+13bb2
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: nt
IMAGE_NAME: ntkrnlmp.exe
DEBUG_FLR_IMAGE_TIMESTAMP: 4c1c44a9
FAILURE_BUCKET_ID: X64_0x1a_41201_nt!_??_::FNODOBFM::_string_+13bb2
BUCKET_ID: X64_0x1a_41201_nt!_??_::FNODOBFM::_string_+13bb2
Followup: MachineOwner
---------