Microsoft (R) Windows Debugger Version 6.12.0002.633 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [F:\a\Minidump\D M P\DMP\030711-23774-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
Symbol search path is: SRV*c:\websymbols*http://msdl.microsoft.com/download/symbols
Executable search path is:
Windows 7 Kernel Version 7601 (Service Pack 1) MP (4 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS
Built by: 7601.17514.amd64fre.win7sp1_rtm.101119-1850
Machine Name:
Kernel base = 0xfffff800`03003000 PsLoadedModuleList = 0xfffff800`03248e90
Debug session time: Sun Mar 6 16:33:49.877 2011 (UTC - 5:00)
System Uptime: 2 days 0:23:42.672
Loading Kernel Symbols
...............................................................
................................................................
....................................
Loading User Symbols
Loading unloaded module list
....................
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
Use !analyze -v to get detailed debugging information.
BugCheck D1, {1, b, 1, fffff8800f01065b}
Unable to load image \SystemRoot\system32\DRIVERS\nvlddmkm.sys, Win32 error 0n2
*** WARNING: Unable to verify timestamp for nvlddmkm.sys
*** ERROR: Module load completed but symbols could not be loaded for nvlddmkm.sys
Probably caused by : hardware ( dxgmms1!memmove+24b )
Followup: MachineOwner
---------
0: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
DRIVER_IRQL_NOT_LESS_OR_EQUAL (d1)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high. This is usually
caused by drivers using improper addresses.
If kernel debugger is available get stack backtrace.
Arguments:
Arg1: 0000000000000001, memory referenced
Arg2: 000000000000000b, IRQL
Arg3: 0000000000000001, value 0 = read operation, 1 = write operation
Arg4: fffff8800f01065b, address which referenced memory
Debugging Details:
------------------
WORKER_ROUTINE:
+3238613836613730
00000000`00000001 ?? ???
WORK_ITEM: fffff8800f01065b
CURRENT_IRQL: b
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT
BUGCHECK_STR: 0xD1
PROCESS_NAME: System
TRAP_FRAME: fffff8000445b1a0 -- (.trap 0xfffff8000445b1a0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000001 rbx=0000000000000000 rcx=fffffa80097a9150
rdx=fffffd7ffacb2450 rsi=0000000000000000 rdi=0000000000000000
rip=fffff8800f01065b rsp=fffff8000445b338 rbp=0000000000000000
r8=0000000000000050 r9=0000000000000002 r10=fffffa80097a47d0
r11=fffffa80097a9100 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei pl nz na po nc
dxgmms1!memmove+0x24b:
fffff880`0f01065b 2000 and byte ptr [rax],al ds:b000:00000000`00000001=??
Resetting default scope
MISALIGNED_IP:
dxgmms1!memmove+24b
fffff880`0f01065b 2000 and byte ptr [rax],al
LAST_CONTROL_TRANSFER: from fffff80003082be9 to fffff80003083640
STACK_TEXT:
fffff800`0445b058 fffff800`03082be9 : 00000000`0000000a 00000000`00000001 00000000`0000000b 00000000`00000001 : nt!KeBugCheckEx
fffff800`0445b060 fffff800`03081860 : fffffa80`06a18760 fffff880`0f0e3068 0000057f`f741b598 00000000`00aa6930 : nt!KiBugCheckDispatch+0x69
fffff800`0445b1a0 fffff880`0f01065b : fffff880`0f008077 00000000`00aa6930 00000000`00000000 00000000`00700000 : nt!KiPageFault+0x260
fffff800`0445b338 fffff880`0f008077 : 00000000`00aa6930 00000000`00000000 00000000`00700000 00000000`00000002 : dxgmms1!memmove+0x24b
fffff800`0445b340 fffff880`0f007f76 : fffffa80`0a2cb850 fffff800`03089a3a fffffa80`097c0000 fffff800`0445b710 : dxgmms1!VidSchDdiNotifyInterruptWorker+0xef
fffff800`0445b390 fffff880`0fd0413f : fffffa80`08087480 00000000`0000000f 00000000`00000000 00000000`00000000 : dxgmms1!VidSchDdiNotifyInterrupt+0x9e
fffff800`0445b3c0 fffff880`0f110418 : fffff800`0445b550 fffff800`0445b550 00000000`00700000 00000000`00000000 : dxgkrnl!DxgNotifyInterruptCB+0x83
fffff800`0445b3f0 fffff800`0445b550 : fffff800`0445b550 00000000`00700000 00000000`00000000 fffffa80`08627000 : nvlddmkm+0xa3418
fffff800`0445b3f8 fffff800`0445b550 : 00000000`00700000 00000000`00000000 fffffa80`08627000 00000000`00000000 : 0xfffff800`0445b550
fffff800`0445b400 00000000`00700000 : 00000000`00000000 fffffa80`08627000 00000000`00000000 00000000`00000000 : 0xfffff800`0445b550
fffff800`0445b408 00000000`00000000 : fffffa80`08627000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x700000
STACK_COMMAND: kb
FOLLOWUP_IP:
dxgmms1!memmove+24b
fffff880`0f01065b 2000 and byte ptr [rax],al
SYMBOL_STACK_INDEX: 3
SYMBOL_NAME: dxgmms1!memmove+24b
FOLLOWUP_NAME: MachineOwner
IMAGE_NAME: hardware
DEBUG_FLR_IMAGE_TIMESTAMP: 0
MODULE_NAME: hardware
FAILURE_BUCKET_ID: X64_IP_MISALIGNED_dxgmms1.sys
BUCKET_ID: X64_IP_MISALIGNED_dxgmms1.sys
Followup: MachineOwner
---------
Microsoft (R) Windows Debugger Version 6.12.0002.633 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [F:\a\Minidump\D M P\DMP\030911-22526-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
Symbol search path is: SRV*c:\websymbols*http://msdl.microsoft.com/download/symbols
Executable search path is:
Windows 7 Kernel Version 7601 (Service Pack 1) MP (4 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS
Built by: 7601.17514.amd64fre.win7sp1_rtm.101119-1850
Machine Name:
Kernel base = 0xfffff800`0301f000 PsLoadedModuleList = 0xfffff800`03264e90
Debug session time: Wed Mar 9 17:45:36.695 2011 (UTC - 5:00)
System Uptime: 1 days 23:30:46.490
Loading Kernel Symbols
...............................................................
................................................................
..................................
Loading User Symbols
Loading unloaded module list
....................
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
Use !analyze -v to get detailed debugging information.
BugCheck 3B, {c000001d, fffff800030d0e67, fffff88005be5110, 0}
Probably caused by : ntkrnlmp.exe ( nt!KxWaitForLockChainValid+17 )
Followup: MachineOwner
---------
1: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
SYSTEM_SERVICE_EXCEPTION (3b)
An exception happened while executing a system service routine.
Arguments:
Arg1: 00000000c000001d, Exception code that caused the bugcheck
Arg2: fffff800030d0e67, Address of the instruction which caused the bugcheck
Arg3: fffff88005be5110, Address of the context record for the exception that caused the bugcheck
Arg4: 0000000000000000, zero.
Debugging Details:
------------------
EXCEPTION_CODE: (NTSTATUS) 0xc000001d - {EXCEPTION} Illegal Instruction An attempt was made to execute an illegal instruction.
FAULTING_IP:
nt!KxWaitForLockChainValid+17
fffff800`030d0e67 0f84f6b1faff je nt! ?? ::FNODOBFM::`string'+0x5db0 (fffff800`0307c063)
CONTEXT: fffff88005be5110 -- (.cxr 0xfffff88005be5110)
rax=fffff8800ba26b68 rbx=0000000000000001 rcx=fffff88005be5b68
rdx=fffffa8009adca98 rsi=fffff88005be5be0 rdi=fffff88005be5b68
rip=fffff800030d0e67 rsp=fffff88005be5af0 rbp=fffff88005be5ca0
r8=fffffa8009adcac1 r9=0000000000000000 r10=fffffa8006a87f30
r11=00000000000f00ff r12=fffffa8009adca50 r13=0000000000000000
r14=0000000000000000 r15=0000000000000001
iopl=0 nv up ei pl nz na pe nc
cs=0010 ss=0018 ds=002b es=002b fs=0053 gs=002b efl=00010202
nt!KxWaitForLockChainValid+0x17:
fffff800`030d0e67 0f84f6b1faff je nt! ?? ::FNODOBFM::`string'+0x5db0 (fffff800`0307c063) [br=0]
Resetting default scope
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT
BUGCHECK_STR: 0x3B
PROCESS_NAME: svchost.exe
CURRENT_IRQL: 2
LAST_CONTROL_TRANSFER: from fffff8000308b6dc to fffff800030d0e67
STACK_TEXT:
fffff880`05be5af0 fffff800`0308b6dc : fffffa80`09adca00 fffff880`00000002 fffffa80`06a87f30 fffff800`000e0001 : nt!KxWaitForLockChainValid+0x17
fffff880`05be5b20 fffff800`0309e8d3 : fffffa80`0b8e4b60 00000000`76e445c0 00000000`00000000 fffffa80`0a10fdb0 : nt!NtWaitForWorkViaWorkerFactory+0x43b
fffff880`05be5c20 00000000`76d92c1a : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x13
00000000`04ccf5e8 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x76d92c1a
FOLLOWUP_IP:
nt!KxWaitForLockChainValid+17
fffff800`030d0e67 0f84f6b1faff je nt! ?? ::FNODOBFM::`string'+0x5db0 (fffff800`0307c063)
SYMBOL_STACK_INDEX: 0
SYMBOL_NAME: nt!KxWaitForLockChainValid+17
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: nt
IMAGE_NAME: ntkrnlmp.exe
DEBUG_FLR_IMAGE_TIMESTAMP: 4ce7951a
STACK_COMMAND: .cxr 0xfffff88005be5110 ; kb
FAILURE_BUCKET_ID: X64_0x3B_nt!KxWaitForLockChainValid+17
BUCKET_ID: X64_0x3B_nt!KxWaitForLockChainValid+17
Followup: MachineOwner
---------
1: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
SYSTEM_SERVICE_EXCEPTION (3b)
An exception happened while executing a system service routine.
Arguments:
Arg1: 00000000c000001d, Exception code that caused the bugcheck
Arg2: fffff800030d0e67, Address of the instruction which caused the bugcheck
Arg3: fffff88005be5110, Address of the context record for the exception that caused the bugcheck
Arg4: 0000000000000000, zero.
Debugging Details:
------------------
EXCEPTION_CODE: (NTSTATUS) 0xc000001d - {EXCEPTION} Illegal Instruction An attempt was made to execute an illegal instruction.
FAULTING_IP:
nt!KxWaitForLockChainValid+17
fffff800`030d0e67 0f84f6b1faff je nt! ?? ::FNODOBFM::`string'+0x5db0 (fffff800`0307c063)
CONTEXT: fffff88005be5110 -- (.cxr 0xfffff88005be5110)
rax=fffff8800ba26b68 rbx=0000000000000001 rcx=fffff88005be5b68
rdx=fffffa8009adca98 rsi=fffff88005be5be0 rdi=fffff88005be5b68
rip=fffff800030d0e67 rsp=fffff88005be5af0 rbp=fffff88005be5ca0
r8=fffffa8009adcac1 r9=0000000000000000 r10=fffffa8006a87f30
r11=00000000000f00ff r12=fffffa8009adca50 r13=0000000000000000
r14=0000000000000000 r15=0000000000000001
iopl=0 nv up ei pl nz na pe nc
cs=0010 ss=0018 ds=002b es=002b fs=0053 gs=002b efl=00010202
nt!KxWaitForLockChainValid+0x17:
fffff800`030d0e67 0f84f6b1faff je nt! ?? ::FNODOBFM::`string'+0x5db0 (fffff800`0307c063) [br=0]
Resetting default scope
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT
BUGCHECK_STR: 0x3B
PROCESS_NAME: svchost.exe
CURRENT_IRQL: 2
LAST_CONTROL_TRANSFER: from fffff8000308b6dc to fffff800030d0e67
STACK_TEXT:
fffff880`05be5af0 fffff800`0308b6dc : fffffa80`09adca00 fffff880`00000002 fffffa80`06a87f30 fffff800`000e0001 : nt!KxWaitForLockChainValid+0x17
fffff880`05be5b20 fffff800`0309e8d3 : fffffa80`0b8e4b60 00000000`76e445c0 00000000`00000000 fffffa80`0a10fdb0 : nt!NtWaitForWorkViaWorkerFactory+0x43b
fffff880`05be5c20 00000000`76d92c1a : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x13
00000000`04ccf5e8 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x76d92c1a
FOLLOWUP_IP:
nt!KxWaitForLockChainValid+17
fffff800`030d0e67 0f84f6b1faff je nt! ?? ::FNODOBFM::`string'+0x5db0 (fffff800`0307c063)
SYMBOL_STACK_INDEX: 0
SYMBOL_NAME: nt!KxWaitForLockChainValid+17
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: nt
IMAGE_NAME: ntkrnlmp.exe
DEBUG_FLR_IMAGE_TIMESTAMP: 4ce7951a
STACK_COMMAND: .cxr 0xfffff88005be5110 ; kb
FAILURE_BUCKET_ID: X64_0x3B_nt!KxWaitForLockChainValid+17
BUCKET_ID: X64_0x3B_nt!KxWaitForLockChainValid+17
Followup: MachineOwner
---------