Microsoft (R) Windows Debugger Version 6.12.0002.633 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [F:\DMP\041611-15640-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
Symbol search path is: SRV*c:\websymbols*http://msdl.microsoft.com/download/symbols
Executable search path is:
Windows 7 Kernel Version 7601 (Service Pack 1.721) MP (4 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS
Built by: 7601.17105.amd64fre.win7sp1_rc.100929-1730
Machine Name:
Kernel base = 0xfffff800`0204d000 PsLoadedModuleList = 0xfffff800`02290e90
Debug session time: Sat Apr 16 02:33:26.765 2011 (UTC - 4:00)
System Uptime: 0 days 0:00:21.531
Loading Kernel Symbols
...............................................................
................................................................
..............
Loading User Symbols
Loading unloaded module list
......
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
Use !analyze -v to get detailed debugging information.
BugCheck 50, {fffff900c263b4c8, 0, fffff880032fdf99, 7}
Unable to load image \SystemRoot\system32\DRIVERS\nvlddmkm.sys, Win32 error 0n2
*** WARNING: Unable to verify timestamp for nvlddmkm.sys
*** ERROR: Module load completed but symbols could not be loaded for nvlddmkm.sys
Could not read faulting driver name
Probably caused by : nvlddmkm.sys ( nvlddmkm+e6f99 )
Followup: MachineOwner
---------
2: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
PAGE_FAULT_IN_NONPAGED_AREA (50)
Invalid system memory was referenced. This cannot be protected by try-except,
it must be protected by a Probe. Typically the address is just plain bad or it
is pointing at freed memory.
Arguments:
Arg1: fffff900c263b4c8, memory referenced.
Arg2: 0000000000000000, value 0 = read operation, 1 = write operation.
Arg3: fffff880032fdf99, If non-zero, the instruction address which referenced the bad memory
address.
Arg4: 0000000000000007, (reserved)
Debugging Details:
------------------
Could not read faulting driver name
READ_ADDRESS: GetPointerFromAddress: unable to read from fffff800022fc0e8
fffff900c263b4c8
FAULTING_IP:
nvlddmkm+e6f99
fffff880`032fdf99 8b4128 mov eax,dword ptr [rcx+28h]
MM_INTERNAL_CODE: 7
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT
BUGCHECK_STR: 0x50
PROCESS_NAME: System
CURRENT_IRQL: 0
TRAP_FRAME: fffff880042aff80 -- (.trap 0xfffff880042aff80)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000000 rbx=0000000000000000 rcx=fffff900c263b4a0
rdx=0000000000000003 rsi=0000000000000000 rdi=0000000000000000
rip=fffff880032fdf99 rsp=fffff880042b0110 rbp=0000000000000000
r8=fffffa80080cf000 r9=0000000000000002 r10=fffff880042b0620
r11=0000000003a27900 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei pl zr na po nc
nvlddmkm+0xe6f99:
fffff880`032fdf99 8b4128 mov eax,dword ptr [rcx+28h] ds:0800:fffff900`c263b4c8=????????
Resetting default scope
LAST_CONTROL_TRANSFER: from fffff800020759eb to fffff800020d1cc0
STACK_TEXT:
fffff880`042afe18 fffff800`020759eb : 00000000`00000050 fffff900`c263b4c8 00000000`00000000 fffff880`042aff80 : nt!KeBugCheckEx
fffff880`042afe20 fffff800`020cfdee : 00000000`00000000 fffffa80`08b43010 fffffa80`08efab00 00000000`00000000 : nt! ?? ::FNODOBFM::`string'+0x45a5b
fffff880`042aff80 fffff880`032fdf99 : 00000000`00010000 00000000`00000003 00000000`3e085000 00000000`00030000 : nt!KiPageFault+0x16e
fffff880`042b0110 00000000`00010000 : 00000000`00000003 00000000`3e085000 00000000`00030000 fffff880`042b01b0 : nvlddmkm+0xe6f99
fffff880`042b0118 00000000`00000003 : 00000000`3e085000 00000000`00030000 fffff880`042b01b0 fffffa80`08eec010 : 0x10000
fffff880`042b0120 00000000`3e085000 : 00000000`00030000 fffff880`042b01b0 fffffa80`08eec010 00000000`00000000 : 0x3
fffff880`042b0128 00000000`00030000 : fffff880`042b01b0 fffffa80`08eec010 00000000`00000000 00000000`00001000 : 0x3e085000
fffff880`042b0130 fffff880`042b01b0 : fffffa80`08eec010 00000000`00000000 00000000`00001000 00000000`00010000 : 0x30000
fffff880`042b0138 fffffa80`08eec010 : 00000000`00000000 00000000`00001000 00000000`00010000 fffff880`042b0180 : 0xfffff880`042b01b0
fffff880`042b0140 00000000`00000000 : 00000000`00001000 00000000`00010000 fffff880`042b0180 00000000`00000000 : 0xfffffa80`08eec010
STACK_COMMAND: kb
FOLLOWUP_IP:
nvlddmkm+e6f99
fffff880`032fdf99 8b4128 mov eax,dword ptr [rcx+28h]
SYMBOL_STACK_INDEX: 3
SYMBOL_NAME: nvlddmkm+e6f99
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: nvlddmkm
IMAGE_NAME: nvlddmkm.sys
DEBUG_FLR_IMAGE_TIMESTAMP: 4cb9dd0e
FAILURE_BUCKET_ID: X64_0x50_nvlddmkm+e6f99
BUCKET_ID: X64_0x50_nvlddmkm+e6f99
Followup: MachineOwner
---------
Microsoft (R) Windows Debugger Version 6.12.0002.633 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [F:\DMP\041511-16125-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
Symbol search path is: SRV*c:\websymbols*http://msdl.microsoft.com/download/symbols
Executable search path is:
Windows 7 Kernel Version 7601 (Service Pack 1.721) MP (4 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS
Built by: 7601.17105.amd64fre.win7sp1_rc.100929-1730
Machine Name:
Kernel base = 0xfffff800`02061000 PsLoadedModuleList = 0xfffff800`022a4e90
Debug session time: Fri Apr 15 15:30:53.531 2011 (UTC - 4:00)
System Uptime: 0 days 2:04:39.312
Loading Kernel Symbols
...............................................................
................................................................
.............................
Loading User Symbols
Loading unloaded module list
.........
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
Use !analyze -v to get detailed debugging information.
BugCheck A0, {b, 17f94a000, 3, 1e47c000}
Probably caused by : ntkrnlmp.exe ( nt!PopWriteHiberPages+a3 )
Followup: MachineOwner
---------
0: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
INTERNAL_POWER_ERROR (a0)
The power policy manager experienced a fatal error.
Arguments:
Arg1: 000000000000000b, The hibernation file is too small.
Arg2: 000000017f94a000, Size of the hibernation file.
Arg3: 0000000000000003, HIBERFILE_PROGRESS_MEMORY_RANGES
Arg4: 000000001e47c000, Size of the remaining memory ranges.
Debugging Details:
------------------
BUGCHECK_STR: 0xA0
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT
PROCESS_NAME: System
CURRENT_IRQL: 2
LAST_CONTROL_TRANSFER: from fffff80002318623 to fffff800020e5cc0
STACK_TEXT:
fffff880`0c5201b8 fffff800`02318623 : 00000000`000000a0 00000000`0000000b 00000001`7f94a000 00000000`00000003 : nt!KeBugCheckEx
fffff880`0c5201c0 fffff800`02318ccb : fffffa80`08240c00 00000000`0000e000 fffffa80`08240c00 00000000`0000f260 : nt!PopWriteHiberPages+0xa3
fffff880`0c5203c0 fffff800`02318e35 : 00001355`44f0241a fffff880`0c5206c8 fffff880`0000e000 00000000`00000010 : nt!PopAddPagesToCompressedPageSet+0x1eb
fffff880`0c520450 fffff800`0231a242 : fffff880`00bb4000 fffff880`0c5206c8 00000000`00000002 00000000`00000048 : nt!PopBufferCompressedPageSet+0xd5
fffff880`0c5204c0 fffff800`0231aa29 : fffffa80`0000b570 fffff880`0a34d000 00000000`0017f94a 00000000`0000f260 : nt!PopWriteHiberImage+0x3d2
fffff880`0c5206b0 fffff800`0201f09e : ffffffff`ffd0b000 00000000`00000000 fffff800`0231a840 00000000`00000000 : nt!PopSaveHiberContext+0x1ea
fffff880`0c520860 fffff800`0231fd59 : 00000000`00003705 00000000`00000000 00000000`00000000 fffff800`020f57d3 : hal!HaliAcpiSleep+0x18f
fffff880`0c5208d0 fffff800`0231fdff : 00000000`00000000 fffffa80`08240c00 fffff800`02287480 00000000`0231ba50 : nt!PopHandleNextState+0x12a
fffff880`0c520920 fffff800`02325480 : 00000000`00000005 00000000`00000001 00000000`00000000 fffff880`0c520aa0 : nt!PopIssueNextState+0x1f
fffff880`0c520950 fffff800`023258e4 : 00000000`00000000 00000000`0022fa00 00000000`00000000 00000000`00000001 : nt!PopInvokeSystemStateHandler+0x3c0
fffff880`0c520b10 fffff800`02321734 : ffffffff`ffffffff ffffffff`ffffffff 00000000`0022fa00 00000000`00000000 : nt!PopEndMirroring+0x84
fffff880`0c520be0 fffff800`02325c65 : fffff880`0c520d00 fffff880`00000008 00000000`00000000 fffffa80`00000008 : nt!MmDuplicateMemory+0xb64
fffff880`0c520cd0 fffff800`023822c2 : fffffa80`0a4a69a0 fffffa80`069f6680 fffffa80`069f6680 fffff800`020dd917 : nt!PopTransitionToSleep+0xd5
fffff880`0c520d40 fffff800`020d3946 : fffff880`009bf180 fffffa80`0a4a69a0 fffffa80`0913d2f0 fffff880`01250b30 : nt!PspSystemThreadStartup+0x5a
fffff880`0c520d80 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiStartSystemThread+0x16
STACK_COMMAND: kb
FOLLOWUP_IP:
nt!PopWriteHiberPages+a3
fffff800`02318623 cc int 3
SYMBOL_STACK_INDEX: 1
SYMBOL_NAME: nt!PopWriteHiberPages+a3
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: nt
IMAGE_NAME: ntkrnlmp.exe
DEBUG_FLR_IMAGE_TIMESTAMP: 4ca43a80
FAILURE_BUCKET_ID: X64_0xA0_nt!PopWriteHiberPages+a3
BUCKET_ID: X64_0xA0_nt!PopWriteHiberPages+a3
Followup: MachineOwner
---------
Microsoft (R) Windows Debugger Version 6.12.0002.633 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [F:\DMP\041211-16343-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
Symbol search path is: SRV*c:\websymbols*http://msdl.microsoft.com/download/symbols
Executable search path is:
Windows 7 Kernel Version 7601 (Service Pack 1.721) MP (4 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS
Built by: 7601.17105.amd64fre.win7sp1_rc.100929-1730
Machine Name:
Kernel base = 0xfffff800`02059000 PsLoadedModuleList = 0xfffff800`0229ce90
Debug session time: Tue Apr 12 02:03:04.917 2011 (UTC - 4:00)
System Uptime: 0 days 1:20:41.683
Loading Kernel Symbols
...............................................................
................................................................
...........................
Loading User Symbols
Loading unloaded module list
........
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
Use !analyze -v to get detailed debugging information.
BugCheck A, {fffffa86051bf2f0, 2, 1, fffff80002105d5c}
Probably caused by : memory_corruption ( nt!MiReplenishPageSlist+d0 )
Followup: MachineOwner
---------
0: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
IRQL_NOT_LESS_OR_EQUAL (a)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high. This is usually
caused by drivers using improper addresses.
If a kernel debugger is available get the stack backtrace.
Arguments:
Arg1: fffffa86051bf2f0, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000001, bitfield :
bit 0 : value 0 = read operation, 1 = write operation
bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
Arg4: fffff80002105d5c, address which referenced memory
Debugging Details:
------------------
WRITE_ADDRESS: GetPointerFromAddress: unable to read from fffff800023080e8
fffffa86051bf2f0
CURRENT_IRQL: 2
FAULTING_IP:
nt!MiReplenishPageSlist+d0
fffff800`02105d5c f00fba6b1000 lock bts dword ptr [rbx+10h],0
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT
BUGCHECK_STR: 0xA
PROCESS_NAME: Skype.exe
TRAP_FRAME: fffff8800cf186b0 -- (.trap 0xfffff8800cf186b0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=00000000201b3fba rbx=0000000000000000 rcx=0000000000000000
rdx=000000000000004f rsi=0000000000000000 rdi=0000000000000000
rip=fffff80002105d5c rsp=fffff8800cf18840 rbp=fffffa80051b02e0
r8=fffff8000230a400 r9=fffffa8006900000 r10=fffffa8006900930
r11=fffff8800cf18930 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei pl nz na po nc
nt!MiReplenishPageSlist+0xd0:
fffff800`02105d5c f00fba6b1000 lock bts dword ptr [rbx+10h],0 ds:00000000`00000010=????????
Resetting default scope
LAST_CONTROL_TRANSFER: from fffff800020dd269 to fffff800020ddcc0
STACK_TEXT:
fffff880`0cf18568 fffff800`020dd269 : 00000000`0000000a fffffa86`051bf2f0 00000000`00000002 00000000`00000001 : nt!KeBugCheckEx
fffff880`0cf18570 fffff800`020dbee0 : 00000000`00000000 fffffa86`051bf2e0 fffffa80`08d1ba20 00000000`00004315 : nt!KiBugCheckDispatch+0x69
fffff880`0cf186b0 fffff800`02105d5c : fffffa80`08d59000 0000007f`ffffffff 00000980`00000000 0000007f`fffffff8 : nt!KiPageFault+0x260
fffff880`0cf18840 fffff800`02105b3f : fffffa80`06900910 00000000`0000003a fffffa80`051d12e0 00000000`0000003a : nt!MiReplenishPageSlist+0xd0
fffff880`0cf188b0 fffff800`020f69d6 : 00000000`00000002 00000000`00000002 fffffa80`0a7ecec8 00000000`00000002 : nt!MiRemoveAnyPage+0x24f
fffff880`0cf189d0 fffff800`020f0a26 : 00000000`00000001 00000000`0af53ff8 fffff880`0cf18c20 fffff680`00057a98 : nt!MiResolveDemandZeroFault+0x586
fffff880`0cf18ac0 fffff800`020dbdee : 00000000`00000001 00000000`0af36fe0 00000000`00000001 00000000`7ef5c000 : nt!MmAccessFault+0x5c6
fffff880`0cf18c20 00000000`7743b308 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiPageFault+0x16e
00000000`0996f9c8 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x7743b308
STACK_COMMAND: kb
FOLLOWUP_IP:
nt!MiReplenishPageSlist+d0
fffff800`02105d5c f00fba6b1000 lock bts dword ptr [rbx+10h],0
SYMBOL_STACK_INDEX: 3
SYMBOL_NAME: nt!MiReplenishPageSlist+d0
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: nt
DEBUG_FLR_IMAGE_TIMESTAMP: 4ca43a80
IMAGE_NAME: memory_corruption
FAILURE_BUCKET_ID: X64_0xA_nt!MiReplenishPageSlist+d0
BUCKET_ID: X64_0xA_nt!MiReplenishPageSlist+d0
Followup: MachineOwner
---------
Microsoft (R) Windows Debugger Version 6.12.0002.633 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [F:\DMP\041011-14906-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
Symbol search path is: SRV*c:\websymbols*http://msdl.microsoft.com/download/symbols
Executable search path is:
Windows 7 Kernel Version 7601 (Service Pack 1.721) MP (4 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS
Built by: 7601.17105.amd64fre.win7sp1_rc.100929-1730
Machine Name:
Kernel base = 0xfffff800`0201b000 PsLoadedModuleList = 0xfffff800`0225ee90
Debug session time: Sun Apr 10 03:19:06.765 2011 (UTC - 4:00)
System Uptime: 0 days 0:00:11.546
Loading Kernel Symbols
..................................................
Loading User Symbols
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
Use !analyze -v to get detailed debugging information.
BugCheck 19, {22, fffffa80086d3000, 0, 0}
Probably caused by : rdyboost.sys ( rdyboost!B_TREE<_SMD_STORE_KEY,ST_STORE<SMD_TRAITS>::_ST_PAGE_ENTRY,4096,NP_CONTEXT>::BTreeMergeNodes+174 )
Followup: MachineOwner
---------
2: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
BAD_POOL_HEADER (19)
The pool is already corrupt at the time of the current request.
This may or may not be due to the caller.
The internal pool links must be walked to figure out a possible cause of
the problem, and then special pool applied to the suspect tags or the driver
verifier to a suspect driver.
Arguments:
Arg1: 0000000000000022,
Arg2: fffffa80086d3000
Arg3: 0000000000000000
Arg4: 0000000000000000
Debugging Details:
------------------
BUGCHECK_STR: 0x19_22
POOL_ADDRESS: GetPointerFromAddress: unable to read from fffff800022ca0e8
fffffa80086d3000
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT
PROCESS_NAME: System
CURRENT_IRQL: 2
LAST_CONTROL_TRANSFER: from fffff800020f645e to fffff8000209fcc0
STACK_TEXT:
fffff880`02539978 fffff800`020f645e : 00000000`00000019 00000000`00000022 fffffa80`086d3000 00000000`00000000 : nt!KeBugCheckEx
fffff880`02539980 fffff800`021c42d8 : 00000000`00000000 fffff880`02539ad0 fffff880`02539a40 0000000a`00000001 : nt! ?? ::FNODOBFM::`string'+0x75c6
fffff880`02539a10 fffff880`01965f1c : fffffa80`079f6128 fffffa80`079f6130 fffffa80`079f6118 00000000`00000000 : nt!ExFreePoolWithTag+0x468
fffff880`02539ac0 fffff880`019654a1 : fffffa80`086c8000 fffffa80`07904830 fffffa80`086d3000 00000000`00000000 : rdyboost!B_TREE<_SMD_STORE_KEY,ST_STORE<SMD_TRAITS>::_ST_PAGE_ENTRY,4096,NP_CONTEXT>::BTreeMergeNodes+0x174
fffff880`02539b00 fffff880`019647f9 : fffffa80`07904830 fffffa80`086c86dc fffffa80`08822970 fffffa80`086c8000 : rdyboost!B_TREE<_SMD_STORE_KEY,ST_STORE<SMD_TRAITS>::_ST_PAGE_ENTRY,4096,NP_CONTEXT>::BTreeDeleteEx+0x241
fffff880`02539b50 fffff880`0196d623 : 00000000`00000000 fffff880`0196c2c8 fffffa80`08822970 00000000`0000000f : rdyboost!ST_STORE<SMD_TRAITS>::StDmPageRemove+0x2e9
fffff880`02539c80 fffff880`0196c41a : fffffa80`08822970 00000000`00000080 00000000`00000080 fffffa80`079f6f88 : rdyboost!ST_STORE<SMD_TRAITS>::StWorkItemProcess+0x22f
fffff880`02539ce0 fffff800`0233c2c2 : 00000000`00000000 fffff880`00000000 fffffa80`079ef970 fffffa80`069e8040 : rdyboost!SMKM_STORE<SMD_TRAITS>::SmStWorker+0x152
fffff880`02539d40 fffff800`0208d946 : fffff880`01e5d180 fffffa80`079ef970 fffff880`01e67fc0 00000000`00000000 : nt!PspSystemThreadStartup+0x5a
fffff880`02539d80 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiStartSystemThread+0x16
STACK_COMMAND: kb
FOLLOWUP_IP:
rdyboost!B_TREE<_SMD_STORE_KEY,ST_STORE<SMD_TRAITS>::_ST_PAGE_ENTRY,4096,NP_CONTEXT>::BTreeMergeNodes+174
fffff880`01965f1c 44017618 add dword ptr [rsi+18h],r14d
SYMBOL_STACK_INDEX: 3
SYMBOL_NAME: rdyboost!B_TREE<_SMD_STORE_KEY,ST_STORE<SMD_TRAITS>::_ST_PAGE_ENTRY,4096,NP_CONTEXT>::BTreeMergeNodes+174
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: rdyboost
IMAGE_NAME: rdyboost.sys
DEBUG_FLR_IMAGE_TIMESTAMP: 4ca43db7
FAILURE_BUCKET_ID: X64_0x19_22_rdyboost!B_TREE__SMD_STORE_KEY,ST_STORE_SMD_TRAITS_::_ST_PAGE_ENTRY,4096,NP_CONTEXT_::BTreeMergeNodes+174
BUCKET_ID: X64_0x19_22_rdyboost!B_TREE__SMD_STORE_KEY,ST_STORE_SMD_TRAITS_::_ST_PAGE_ENTRY,4096,NP_CONTEXT_::BTreeMergeNodes+174
Followup: MachineOwner
---------
Microsoft (R) Windows Debugger Version 6.12.0002.633 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [F:\DMP\040911-16125-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
Symbol search path is: SRV*c:\websymbols*http://msdl.microsoft.com/download/symbols
Executable search path is:
Windows 7 Kernel Version 7601 (Service Pack 1.721) MP (4 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS
Built by: 7601.17105.amd64fre.win7sp1_rc.100929-1730
Machine Name:
Kernel base = 0xfffff800`0204c000 PsLoadedModuleList = 0xfffff800`0228fe90
Debug session time: Sat Apr 9 02:22:18.730 2011 (UTC - 4:00)
System Uptime: 0 days 0:11:25.496
Loading Kernel Symbols
...............................................................
................................................................
............................
Loading User Symbols
Loading unloaded module list
........
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
Use !analyze -v to get detailed debugging information.
BugCheck 1000007E, {ffffffffc0000005, fffff88003c2522e, fffff880040b0658, fffff880040afeb0}
Probably caused by : dxgmms1.sys ( dxgmms1!VIDMM_GLOBAL::UnmapVideoApertureSegmentInternal+c2 )
Followup: MachineOwner
---------
2: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
SYSTEM_THREAD_EXCEPTION_NOT_HANDLED_M (1000007e)
This is a very common bugcheck. Usually the exception address pinpoints
the driver/function that caused the problem. Always note this address
as well as the link date of the driver/image that contains this address.
Some common problems are exception code 0x80000003. This means a hard
coded breakpoint or assertion was hit, but this system was booted
/NODEBUG. This is not supposed to happen as developers should never have
hardcoded breakpoints in retail code, but ...
If this happens, make sure a debugger gets connected, and the
system is booted /DEBUG. This will let us see why this breakpoint is
happening.
Arguments:
Arg1: ffffffffc0000005, The exception code that was not handled
Arg2: fffff88003c2522e, The address that the exception occurred at
Arg3: fffff880040b0658, Exception Record Address
Arg4: fffff880040afeb0, Context Record Address
Debugging Details:
------------------
EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - The instruction at 0x%08lx referenced memory at 0x%08lx. The memory could not be %s.
FAULTING_IP:
dxgmms1!VIDMM_GLOBAL::UnmapVideoApertureSegmentInternal+c2
fffff880`03c2522e 488b48c8 mov rcx,qword ptr [rax-38h]
EXCEPTION_RECORD: fffff880040b0658 -- (.exr 0xfffff880040b0658)
ExceptionAddress: fffff88003c2522e (dxgmms1!VIDMM_GLOBAL::UnmapVideoApertureSegmentInternal+0x00000000000000c2)
ExceptionCode: c0000005 (Access violation)
ExceptionFlags: 00000000
NumberParameters: 2
Parameter[0]: 0000000000000000
Parameter[1]: ffffffffffffffff
Attempt to read from address ffffffffffffffff
CONTEXT: fffff880040afeb0 -- (.cxr 0xfffff880040afeb0)
rax=fa800896ad0004c0 rbx=fffff8a002fa97f0 rcx=fffffa8006e01a70
rdx=fffffa80099e9010 rsi=fffffa8009a06000 rdi=fffff8a002fa97f0
rip=fffff88003c2522e rsp=fffff880040b0890 rbp=0000000000000000
r8=fffff8a002fa97f0 r9=fffff880040b08c0 r10=fffff88003c11c40
r11=fffff8a0083faa30 r12=0000000000000002 r13=000000000006f64f
r14=0000000000000200 r15=fffff880040b0ca0
iopl=0 nv up ei ng nz na pe nc
cs=0010 ss=0018 ds=002b es=002b fs=0053 gs=002b efl=00010282
dxgmms1!VIDMM_GLOBAL::UnmapVideoApertureSegmentInternal+0xc2:
fffff880`03c2522e 488b48c8 mov rcx,qword ptr [rax-38h] ds:002b:fa800896`ad000488=????????????????
Resetting default scope
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT
PROCESS_NAME: System
CURRENT_IRQL: 0
ERROR_CODE: (NTSTATUS) 0xc0000005 - The instruction at 0x%08lx referenced memory at 0x%08lx. The memory could not be %s.
EXCEPTION_PARAMETER1: 0000000000000000
EXCEPTION_PARAMETER2: ffffffffffffffff
READ_ADDRESS: GetPointerFromAddress: unable to read from fffff800022fb0e8
ffffffffffffffff
FOLLOWUP_IP:
dxgmms1!VIDMM_GLOBAL::UnmapVideoApertureSegmentInternal+c2
fffff880`03c2522e 488b48c8 mov rcx,qword ptr [rax-38h]
BUGCHECK_STR: 0x7E
LAST_CONTROL_TRANSFER: from fffff88003c250f6 to fffff88003c2522e
STACK_TEXT:
fffff880`040b0890 fffff880`03c250f6 : 00000000`00000000 00000000`00000200 fffffa80`09a06000 00000000`00000000 : dxgmms1!VIDMM_GLOBAL::UnmapVideoApertureSegmentInternal+0xc2
fffff880`040b0a20 fffff880`03c2e642 : fffffa80`09a15660 00000000`00000000 00000000`00000200 00000000`00000000 : dxgmms1!VIDMM_GLOBAL::UnmapVideoApertureSegment+0x13e
fffff880`040b0a90 fffff880`03c2d889 : fffff8a0`02fa97f0 00000000`00000000 fffffa80`06e6b400 fffffa80`09a15660 : dxgmms1!VIDMM_APERTURE_SEGMENT::UnmapApertureRange+0x7a
fffff880`040b0ae0 fffff880`03c2025d : fffff8a0`02fa97f0 fffffa80`09a06000 fffffa80`06e6b480 fffffa80`09a06000 : dxgmms1!VIDMM_APERTURE_SEGMENT::EvictResource+0xf9
fffff880`040b0b30 fffff880`03c1b358 : fffffa80`0a34cf20 00000000`00000000 00000000`00000000 fffff880`040b0ca0 : dxgmms1!VIDMM_GLOBAL::ProcessDeferredCommand+0x96d
fffff880`040b0c50 fffff880`03c3916d : fffffa80`00000000 fffffa80`09998410 00000000`6d4d6956 fffff880`00000174 : dxgmms1!VidMmiProcessTerminationCommand+0x4c
fffff880`040b0ca0 fffff880`03c383f8 : fffff880`01e61f40 fffffa80`06d3d3c0 00000000`00000000 fffffa80`09998410 : dxgmms1!VidSchiSubmitDeviceCommand+0x39
fffff880`040b0cd0 fffff880`03c37e96 : 00000000`00000000 fffffa80`06d3d3c0 00000000`00000080 fffffa80`09998410 : dxgmms1!VidSchiSubmitQueueCommand+0xb0
fffff880`040b0d00 fffff800`0236d2c2 : 00000000`028136d3 fffffa80`099a8b60 fffffa80`069e8040 fffffa80`099a8b60 : dxgmms1!VidSchiWorkerThread+0xd6
fffff880`040b0d40 fffff800`020be946 : fffff880`01e5d180 fffffa80`099a8b60 fffff880`01e67fc0 fffff880`01228a90 : nt!PspSystemThreadStartup+0x5a
fffff880`040b0d80 00000000`00000000 : fffff880`040b1000 fffff880`040ab000 fffff880`040b0480 00000000`00000000 : nt!KiStartSystemThread+0x16
SYMBOL_STACK_INDEX: 0
SYMBOL_NAME: dxgmms1!VIDMM_GLOBAL::UnmapVideoApertureSegmentInternal+c2
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: dxgmms1
IMAGE_NAME: dxgmms1.sys
DEBUG_FLR_IMAGE_TIMESTAMP: 4a5bc578
STACK_COMMAND: .cxr 0xfffff880040afeb0 ; kb
FAILURE_BUCKET_ID: X64_0x7E_dxgmms1!VIDMM_GLOBAL::UnmapVideoApertureSegmentInternal+c2
BUCKET_ID: X64_0x7E_dxgmms1!VIDMM_GLOBAL::UnmapVideoApertureSegmentInternal+c2
Followup: MachineOwner
---------
Microsoft (R) Windows Debugger Version 6.12.0002.633 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [F:\DMP\050711-16906-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
Symbol search path is: SRV*c:\websymbols*http://msdl.microsoft.com/download/symbols
Executable search path is:
Windows 7 Kernel Version 7601 (Service Pack 1.721) MP (4 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS
Built by: 7601.17105.amd64fre.win7sp1_rc.100929-1730
Machine Name:
Kernel base = 0xfffff800`02005000 PsLoadedModuleList = 0xfffff800`02248e90
Debug session time: Sat May 7 09:42:13.058 2011 (UTC - 4:00)
System Uptime: 0 days 0:19:15.777
Loading Kernel Symbols
...............................................................
................................................................
............................
Loading User Symbols
Loading unloaded module list
........
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
Use !analyze -v to get detailed debugging information.
BugCheck 3B, {c0000005, fffff800020b1d5c, fffff8800c074010, 0}
Probably caused by : memory_corruption ( nt!MiReplenishPageSlist+d0 )
Followup: MachineOwner
---------
0: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
SYSTEM_SERVICE_EXCEPTION (3b)
An exception happened while executing a system service routine.
Arguments:
Arg1: 00000000c0000005, Exception code that caused the bugcheck
Arg2: fffff800020b1d5c, Address of the instruction which caused the bugcheck
Arg3: fffff8800c074010, Address of the context record for the exception that caused the bugcheck
Arg4: 0000000000000000, zero.
Debugging Details:
------------------
EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - The instruction at 0x%08lx referenced memory at 0x%08lx. The memory could not be %s.
FAULTING_IP:
nt!MiReplenishPageSlist+d0
fffff800`020b1d5c f00fba6b1000 lock bts dword ptr [rbx+10h],0
CONTEXT: fffff8800c074010 -- (.cxr 0xfffff8800c074010)
rax=fffffa800024a440 rbx=fffef28006decc00 rcx=0000000000000000
rdx=000000000000004b rsi=0000000000000007 rdi=0000000000000004
rip=fffff800020b1d5c rsp=fffff8800c0749f0 rbp=fffffa800024bc40
r8=fffff800022b6400 r9=fffffa8005100000 r10=fffffa8005101100
r11=fffff8800c074af0 r12=fffff800022b6400 r13=2aaaaaaaaaaaaaab
r14=fdffffffffffffff r15=0000058000000000
iopl=0 nv up ei pl nz na pe nc
cs=0010 ss=0018 ds=002b es=002b fs=0053 gs=002b efl=00210202
nt!MiReplenishPageSlist+0xd0:
fffff800`020b1d5c f00fba6b1000 lock bts dword ptr [rbx+10h],0 ds:002b:fffef280`06decc10=????????
Resetting default scope
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT
BUGCHECK_STR: 0x3B
PROCESS_NAME: firefox.exe
CURRENT_IRQL: 2
TRAP_FRAME: fffff8800c074860 -- (.trap 0xfffff8800c074860)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=fffffa800024a440 rbx=0000000000000000 rcx=0000000000000000
rdx=000000000000004b rsi=0000000000000000 rdi=0000000000000000
rip=fffff800020b1d5c rsp=fffff8800c0749f0 rbp=fffffa800024bc40
r8=fffff800022b6400 r9=fffffa8005100000 r10=fffffa8005101100
r11=fffff8800c074af0 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei pl nz na pe nc
nt!MiReplenishPageSlist+0xd0:
fffff800`020b1d5c f00fba6b1000 lock bts dword ptr [rbx+10h],0 ds:fffe:00000000`00000010=????????
Resetting default scope
EXCEPTION_RECORD: fffff8800c0747b8 -- (.exr 0xfffff8800c0747b8)
ExceptionAddress: fffff800020b1d5c (nt!MiReplenishPageSlist+0x00000000000000d0)
ExceptionCode: c0000005 (Access violation)
ExceptionFlags: 00000000
NumberParameters: 2
Parameter[0]: 0000000000000000
Parameter[1]: ffffffffffffffff
Attempt to read from address ffffffffffffffff
LAST_CONTROL_TRANSFER: from fffff800020b1b3f to fffff800020b1d5c
STACK_TEXT:
fffff880`0c0749f0 fffff800`020b1b3f : fffffa80`051010e0 00000000`0000006c fffffa80`0024ec40 00000000`0000006c : nt!MiReplenishPageSlist+0xd0
fffff880`0c074a60 fffff800`020a29d6 : 00000000`00000002 fffff880`00000002 fffff880`08feac00 00000000`00000000 : nt!MiRemoveAnyPage+0x24f
fffff880`0c074b80 fffff800`020b2e04 : 00000000`00000001 fffff900`c3357000 fffff880`0c074ee0 fffff6fc`80619ab8 : nt!MiResolveDemandZeroFault+0x586
fffff880`0c074c70 fffff800`0209cd51 : 00000000`00000000 00000000`00000001 00000000`00000001 00000000`00000000 : nt!MiDispatchFault+0x8c4
fffff880`0c074d80 fffff800`02087dee : 00000000`00000001 fffff900`c32cf000 00000000`00000000 00000000`00000000 : nt!MmAccessFault+0x8f1
fffff880`0c074ee0 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiPageFault+0x16e
FOLLOWUP_IP:
nt!MiReplenishPageSlist+d0
fffff800`020b1d5c f00fba6b1000 lock bts dword ptr [rbx+10h],0
SYMBOL_STACK_INDEX: 0
SYMBOL_NAME: nt!MiReplenishPageSlist+d0
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: nt
DEBUG_FLR_IMAGE_TIMESTAMP: 4ca43a80
STACK_COMMAND: .cxr 0xfffff8800c074010 ; kb
IMAGE_NAME: memory_corruption
FAILURE_BUCKET_ID: X64_0x3B_nt!MiReplenishPageSlist+d0
BUCKET_ID: X64_0x3B_nt!MiReplenishPageSlist+d0
Followup: MachineOwner
---------
Microsoft (R) Windows Debugger Version 6.12.0002.633 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [F:\DMP\050711-21796-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
Symbol search path is: SRV*c:\websymbols*http://msdl.microsoft.com/download/symbols
Executable search path is:
Windows 7 Kernel Version 7601 (Service Pack 1.721) MP (4 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS
Built by: 7601.17105.amd64fre.win7sp1_rc.100929-1730
Machine Name:
Kernel base = 0xfffff800`02019000 PsLoadedModuleList = 0xfffff800`0225ce90
Debug session time: Sat May 7 10:07:39.717 2011 (UTC - 4:00)
System Uptime: 0 days 0:14:35.483
Loading Kernel Symbols
...............................................................
................................................................
............................
Loading User Symbols
Loading unloaded module list
.......
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
Use !analyze -v to get detailed debugging information.
BugCheck 19, {3, fffffa80051792a0, fffffa80051793a0, fffffa80051793a0}
Probably caused by : Pool_Corruption ( nt!ExDeferredFreePool+a96 )
Followup: Pool_corruption
---------
3: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
BAD_POOL_HEADER (19)
The pool is already corrupt at the time of the current request.
This may or may not be due to the caller.
The internal pool links must be walked to figure out a possible cause of
the problem, and then special pool applied to the suspect tags or the driver
verifier to a suspect driver.
Arguments:
Arg1: 0000000000000003, the pool freelist is corrupt.
Arg2: fffffa80051792a0, the pool entry being checked.
Arg3: fffffa80051793a0, the read back flink freelist value (should be the same as 2).
Arg4: fffffa80051793a0, the read back blink freelist value (should be the same as 2).
Debugging Details:
------------------
BUGCHECK_STR: 0x19_3
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT
PROCESS_NAME: Skype.exe
CURRENT_IRQL: 0
LAST_CONTROL_TRANSFER: from fffff800021c1d5f to fffff8000209dcc0
STACK_TEXT:
fffff880`096ae0b8 fffff800`021c1d5f : 00000000`00000019 00000000`00000003 fffffa80`051792a0 fffffa80`051793a0 : nt!KeBugCheckEx
fffff880`096ae0c0 fffff800`024e0ed8 : fffff8a0`00000001 00000000`00000000 fffffa80`05602c00 00000000`00000000 : nt!ExDeferredFreePool+0xa96
fffff880`096ae1b0 fffff800`021aee31 : 00000000`000007ff 00000000`00000330 fffff8a0`00000001 fffff8a0`0b670c70 : nt!PfpRpFileKeyUpdate+0x98
fffff880`096ae240 fffff880`0119155d : 00000000`00000000 00000000`00000000 fffff880`096ae3d8 fffffa80`05792aa0 : nt!PfFileInfoNotify+0x5a1
fffff880`096ae2d0 fffff880`01191ba8 : fffffa80`06356010 fffff8a0`0a59b740 fffff880`096ae4b0 fffff880`096ae4b0 : fileinfo!FIStreamLog+0x89
fffff880`096ae3a0 fffff880`011913c8 : fffff8a0`0a59b740 00000000`00000000 fffff880`096ae4b0 fffff880`096ae4b0 : fileinfo!FIStreamSetFileInfo+0x14c
fffff880`096ae410 fffff880`0118fbdb : fffff140`025e1d27 00000000`00000001 00000000`00000000 00000000`00002db9 : fileinfo!FIStreamGetInfo+0x17c
fffff880`096ae490 fffff880`01140298 : 00000000`00000000 fffff8a0`0a59b740 fffffa80`05634820 00000000`00000000 : fileinfo!FIPostCreateCallback+0x1c7
fffff880`096ae520 fffff880`0113f6db : fffffa80`062e4030 fffffa80`057b0e00 fffffa80`0710f010 fffffa80`0710f230 : fltmgr!FltpPerformPostCallbacks+0x368
fffff880`096ae5f0 fffff880`0115e4c9 : fffffa80`05634480 fffffa80`06356010 fffffa80`05634400 fffffa80`0619f9e0 : fltmgr!FltpLegacyProcessingAfterPreCallbacksCompleted+0x39b
fffff880`096ae680 fffff800`0239dde5 : 00000000`00000005 fffffa80`0557f1c8 fffffa80`05863010 00000000`00000000 : fltmgr!FltpCreate+0x2a9
fffff880`096ae730 fffff800`02391698 : fffffa80`060e7c50 fffff800`00000000 fffffa80`0557f010 00000000`00000001 : nt!IopParseDevice+0x5a5
fffff880`096ae8c0 fffff800`02392306 : 00000000`00000000 fffffa80`0557f010 fffff8a0`01208a70 fffffa80`051f4210 : nt!ObpLookupObjectName+0x588
fffff880`096ae9b0 fffff800`0239f407 : 00000000`000007ff 00000000`00000001 fffffa80`055cf901 ffffffff`ffffffff : nt!ObOpenObjectByName+0x306
fffff880`096aea80 fffff800`023a1f58 : 00000000`0008e2e8 fffff8a0`80100080 fffff880`01ecc180 00000000`0008e300 : nt!IopCreateFile+0x2b7
fffff880`096aeb20 fffff800`0209cf53 : 00000000`00000000 fffffa80`08d0cb00 00000000`746c6644 fffff880`096aec38 : nt!NtCreateFile+0x78
fffff880`096aebb0 00000000`77b020ca : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x13
00000000`0008e278 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x77b020ca
STACK_COMMAND: kb
FOLLOWUP_IP:
nt!ExDeferredFreePool+a96
fffff800`021c1d5f cc int 3
SYMBOL_STACK_INDEX: 1
SYMBOL_NAME: nt!ExDeferredFreePool+a96
FOLLOWUP_NAME: Pool_corruption
IMAGE_NAME: Pool_Corruption
DEBUG_FLR_IMAGE_TIMESTAMP: 0
MODULE_NAME: Pool_Corruption
FAILURE_BUCKET_ID: X64_0x19_3_nt!ExDeferredFreePool+a96
BUCKET_ID: X64_0x19_3_nt!ExDeferredFreePool+a96
Followup: Pool_corruption
---------