Microsoft (R) Windows Debugger Version 6.12.0002.633 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [F:\a\Minidump\D M P\DMP\012411-28735-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
Symbol search path is: SRV*c:\websymbols*http://msdl.microsoft.com/download/symbols
Executable search path is:
Windows 7 Kernel Version 7600 MP (4 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS
Built by: 7600.16617.amd64fre.win7_gdr.100618-1621
Machine Name:
Kernel base = 0xfffff800`03201000 PsLoadedModuleList = 0xfffff800`0343ee50
Debug session time: Mon Jan 24 02:15:43.032 2011 (UTC - 5:00)
System Uptime: 0 days 0:10:11.702
Loading Kernel Symbols
...............................................................
................................................................
.................................
Loading User Symbols
Loading unloaded module list
.....
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
Use !analyze -v to get detailed debugging information.
BugCheck 1A, {41287, 58, 0, 0}
Probably caused by : ntkrnlmp.exe ( nt! ?? ::FNODOBFM::`string'+42ba5 )
Followup: MachineOwner
---------
1: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
MEMORY_MANAGEMENT (1a)
# Any other values for parameter 1 must be individually examined.
Arguments:
Arg1: 0000000000041287, The subtype of the bugcheck.
Arg2: 0000000000000058
Arg3: 0000000000000000
Arg4: 0000000000000000
Debugging Details:
------------------
BUGCHECK_STR: 0x1a_41287
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT
PROCESS_NAME: svchost.exe
CURRENT_IRQL: 0
TRAP_FRAME: fffff88007f9e090 -- (.trap 0xfffff88007f9e090)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=fffff88007f9e298 rbx=0000000000000000 rcx=0000000000000008
rdx=fffff88007f9e250 rsi=0000000000000000 rdi=0000000000000000
rip=fffff8000332fa70 rsp=fffff88007f9e220 rbp=000000000a000000
r8=0000058000000000 r9=00000000ffffffff r10=ffffffffffffffff
r11=0000000000000011 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei pl zr na po nc
nt!MiReleaseConfirmedPageFileSpace+0x40:
fffff800`0332fa70 4c8b6e58 mov r13,qword ptr [rsi+58h] ds:00000000`00000058=????????????????
Resetting default scope
LAST_CONTROL_TRANSFER: from fffff8000321db7a to fffff80003271740
STACK_TEXT:
fffff880`07f9df28 fffff800`0321db7a : 00000000`0000001a 00000000`00041287 00000000`00000058 00000000`00000000 : nt!KeBugCheckEx
fffff880`07f9df30 fffff800`0326f82e : 00000000`00000000 0a000000`00020070 fffff6fb`40000800 fffff800`0328b7c0 : nt! ?? ::FNODOBFM::`string'+0x42ba5
fffff880`07f9e090 fffff800`0332fa70 : 00000000`00000000 fffffa80`009a5d50 0000000f`ffffffff fffff8a0`0ba1cdb8 : nt!KiPageFault+0x16e
fffff880`07f9e220 fffff800`032e9c95 : 0a000000`00020070 fffff680`00111000 0a000000`00020070 fffff680`00111180 : nt!MiReleaseConfirmedPageFileSpace+0x40
fffff880`07f9e2a0 fffff800`032b2dee : fffff880`07f9ebc8 00000000`00007b0a fffffa80`06babb30 fffffa80`06babec8 : nt! ?? ::FNODOBFM::`string'+0x38be9
fffff880`07f9eb30 fffff800`03270993 : ffffffff`ffffffff 00000000`0302f1a8 00000000`0302f1a0 00000000`00000001 : nt!NtFreeVirtualMemory+0x2de
fffff880`07f9ec20 00000000`7792ff3a : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x13
00000000`0302f168 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x7792ff3a
STACK_COMMAND: kb
FOLLOWUP_IP:
nt! ?? ::FNODOBFM::`string'+42ba5
fffff800`0321db7a cc int 3
SYMBOL_STACK_INDEX: 1
SYMBOL_NAME: nt! ?? ::FNODOBFM::`string'+42ba5
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: nt
IMAGE_NAME: ntkrnlmp.exe
DEBUG_FLR_IMAGE_TIMESTAMP: 4c1c44a9
FAILURE_BUCKET_ID: X64_0x1a_41287_nt!_??_::FNODOBFM::_string_+42ba5
BUCKET_ID: X64_0x1a_41287_nt!_??_::FNODOBFM::_string_+42ba5
Followup: MachineOwner
---------
Microsoft (R) Windows Debugger Version 6.12.0002.633 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [F:\a\Minidump\D M P\DMP\012111-25396-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
Symbol search path is: SRV*c:\websymbols*http://msdl.microsoft.com/download/symbols
Executable search path is:
Windows 7 Kernel Version 7600 MP (4 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS
Built by: 7600.16617.amd64fre.win7_gdr.100618-1621
Machine Name:
Kernel base = 0xfffff800`0320f000 PsLoadedModuleList = 0xfffff800`0344ce50
Debug session time: Fri Jan 21 14:02:09.349 2011 (UTC - 5:00)
System Uptime: 0 days 0:49:09.645
Loading Kernel Symbols
...............................................................
................................................................
.................................
Loading User Symbols
Loading unloaded module list
......
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
Use !analyze -v to get detailed debugging information.
BugCheck 3D, {fffff88002ffb040, 0, 0, fffff880049a805d}
Unable to load image \SystemRoot\system32\DRIVERS\atikmdag.sys, Win32 error 0n2
*** WARNING: Unable to verify timestamp for atikmdag.sys
*** ERROR: Module load completed but symbols could not be loaded for atikmdag.sys
Probably caused by : atikmdag.sys ( atikmdag+e305d )
Followup: MachineOwner
---------
3: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
INTERRUPT_EXCEPTION_NOT_HANDLED (3d)
Arguments:
Arg1: fffff88002ffb040
Arg2: 0000000000000000
Arg3: 0000000000000000
Arg4: fffff880049a805d
Debugging Details:
------------------
CONTEXT: fffff88002ffb040 -- (.cxr 0xfffff88002ffb040)
rax=00fff8800b77e000 rbx=fffffa8006227c50 rcx=fffffa8006227000
rdx=fffffa8006227c80 rsi=fffffa8006227c90 rdi=fffffa8006227000
rip=fffff880049a805d rsp=fffff88002ffba10 rbp=fffffa8006227c84
r8=fffffa8006227c84 r9=fffffa8006227c90 r10=fffffa800599f500
r11=0000000000000002 r12=fffffa8006227c80 r13=fffffa8005ae7d00
r14=fffffa8005ae5400 r15=0000000000000000
iopl=0 nv up ei pl zr na po nc
cs=0010 ss=0000 ds=002b es=002b fs=0053 gs=002b efl=00010246
atikmdag+0xe305d:
fffff880`049a805d 8b00 mov eax,dword ptr [rax] ds:002b:00fff880`0b77e000=????????
Resetting default scope
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT
BUGCHECK_STR: 0x3D
PROCESS_NAME: System
CURRENT_IRQL: a
LAST_CONTROL_TRANSFER: from fffff88002ffba88 to fffff880049a805d
STACK_TEXT:
fffff880`02ffba10 fffff880`02ffba88 : fffff880`049a18e9 fffff880`02efe103 00000000`0000000a fffffa80`05ae5530 : atikmdag+0xe305d
fffff880`02ffba18 fffff880`049a18e9 : fffff880`02efe103 00000000`0000000a fffffa80`05ae5530 fffff880`049a83ef : 0xfffff880`02ffba88
fffff880`02ffba20 fffff880`02efe103 : 00000000`0000000a fffffa80`05ae5530 fffff880`049a83ef fffffa80`06227000 : atikmdag+0xdc8e9
fffff880`02ffba28 00000000`0000000a : fffffa80`05ae5530 fffff880`049a83ef fffffa80`06227000 fffff880`02ffbb80 : 0xfffff880`02efe103
fffff880`02ffba30 fffffa80`05ae5530 : fffff880`049a83ef fffffa80`06227000 fffff880`02ffbb80 00000000`00000000 : 0xa
fffff880`02ffba38 fffff880`049a83ef : fffffa80`06227000 fffff880`02ffbb80 00000000`00000000 fffffa80`06227c50 : 0xfffffa80`05ae5530
fffff880`02ffba40 fffffa80`06227000 : fffff880`02ffbb80 00000000`00000000 fffffa80`06227c50 fffffa80`05ae5530 : atikmdag+0xe33ef
fffff880`02ffba48 fffff880`02ffbb80 : 00000000`00000000 fffffa80`06227c50 fffffa80`05ae5530 fffff880`0499acf8 : 0xfffffa80`06227000
fffff880`02ffba50 00000000`00000000 : fffffa80`06227c50 fffffa80`05ae5530 fffff880`0499acf8 fffffa80`06227000 : 0xfffff880`02ffbb80
FOLLOWUP_IP:
atikmdag+e305d
fffff880`049a805d 8b00 mov eax,dword ptr [rax]
SYMBOL_STACK_INDEX: 0
SYMBOL_NAME: atikmdag+e305d
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: atikmdag
IMAGE_NAME: atikmdag.sys
DEBUG_FLR_IMAGE_TIMESTAMP: 4cef1f94
STACK_COMMAND: .cxr 0xfffff88002ffb040 ; kb
FAILURE_BUCKET_ID: X64_0x3D_atikmdag+e305d
BUCKET_ID: X64_0x3D_atikmdag+e305d
Followup: MachineOwner
---------