Microsoft (R) Windows Debugger Version 6.12.0002.633 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [F:\a\Minidump\D M P\DMP\010111-16114-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
Symbol search path is: SRV*c:\websymbols*http://msdl.microsoft.com/download/symbols
Executable search path is:
Windows 7 Kernel Version 7600 MP (4 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS Personal
Built by: 7600.16617.amd64fre.win7_gdr.100618-1621
Machine Name:
Kernel base = 0xfffff800`03259000 PsLoadedModuleList = 0xfffff800`03496e50
Debug session time: Sat Jan 1 20:16:50.884 2011 (UTC - 5:00)
System Uptime: 0 days 2:03:00.351
Loading Kernel Symbols
...............................................................
................................................................
.........................
Loading User Symbols
Loading unloaded module list
.....
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
Use !analyze -v to get detailed debugging information.
BugCheck 4E, {99, 995e1, 0, 169461}
Probably caused by : memory_corruption ( nt!MiBadShareCount+4c )
Followup: MachineOwner
---------
3: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
PFN_LIST_CORRUPT (4e)
Typically caused by drivers passing bad memory descriptor lists (ie: calling
MmUnlockPages twice with the same list, etc). If a kernel debugger is
available get the stack trace.
Arguments:
Arg1: 0000000000000099, A PTE or PFN is corrupt
Arg2: 00000000000995e1, page frame number
Arg3: 0000000000000000, current page state
Arg4: 0000000000169461, 0
Debugging Details:
------------------
BUGCHECK_STR: 0x4E_99
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT
PROCESS_NAME: MsMpEng.exe
CURRENT_IRQL: 2
LAST_CONTROL_TRANSFER: from fffff8000335938c to fffff800032c9740
STACK_TEXT:
fffff880`08871f98 fffff800`0335938c : 00000000`0000004e 00000000`00000099 00000000`000995e1 00000000`00000000 : nt!KeBugCheckEx
fffff880`08871fa0 fffff800`0333b9ee : 00000000`00000000 fffff680`00088388 00000000`00000002 00000000`00000001 : nt!MiBadShareCount+0x4c
fffff880`08871fe0 fffff800`0329dc23 : fffffa80`08085730 fffff700`0000da88 0000007f`fffffff8 fffff8a0`00a2ad80 : nt! ?? ::FNODOBFM::`string'+0x32235
fffff880`08872070 fffff800`0329c68a : fffffa80`08085730 fffffa80`00000001 fffff8a0`0000c08b fffff880`00000000 : nt!MiDeleteAddressesInWorkingSet+0x307
fffff880`08872920 fffff800`035aedcf : fffff8a0`00f61060 fffff880`08872c20 00000000`00000000 fffffa80`07c0ca10 : nt!MmCleanProcessAddressSpace+0x96
fffff880`08872970 fffff800`03587635 : 00000000`000000ff fffff8a0`02c85701 000007ff`fff7c000 fffffa80`08075b60 : nt!PspExitThread+0x92f
fffff880`08872a30 fffff800`032a61db : 00000000`00000000 fffffa80`0808e8c0 00000000`0393f920 fffff880`08872be0 : nt!PsExitSpecialApc+0x1d
fffff880`08872a60 fffff800`032a6620 : 00000000`771b4298 fffff880`08872ae0 fffff800`0358774c 00000000`00000001 : nt!KiDeliverApc+0x2eb
fffff880`08872ae0 fffff800`032c8a37 : fffffa80`07c0ca10 00000000`771b4270 00000000`000000c0 fffffa80`06dce060 : nt!KiInitiateUserApc+0x70
fffff880`08872c20 00000000`7710165a : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceExit+0x9c
00000000`0393f738 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x7710165a
STACK_COMMAND: kb
FOLLOWUP_IP:
nt!MiBadShareCount+4c
fffff800`0335938c cc int 3
SYMBOL_STACK_INDEX: 1
SYMBOL_NAME: nt!MiBadShareCount+4c
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: nt
DEBUG_FLR_IMAGE_TIMESTAMP: 4c1c44a9
IMAGE_NAME: memory_corruption
FAILURE_BUCKET_ID: X64_0x4E_99_nt!MiBadShareCount+4c
BUCKET_ID: X64_0x4E_99_nt!MiBadShareCount+4c
Followup: MachineOwner
---------
Microsoft (R) Windows Debugger Version 6.12.0002.633 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [F:\a\Minidump\D M P\DMP\122110-16286-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
Symbol search path is: SRV*c:\websymbols*http://msdl.microsoft.com/download/symbols
Executable search path is:
Windows 7 Kernel Version 7600 MP (4 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS Personal
Built by: 7600.16617.amd64fre.win7_gdr.100618-1621
Machine Name:
Kernel base = 0xfffff800`03250000 PsLoadedModuleList = 0xfffff800`0348de50
Debug session time: Tue Dec 21 18:30:47.683 2010 (UTC - 5:00)
System Uptime: 0 days 7:05:54.150
Loading Kernel Symbols
...............................................................
................................................................
........................
Loading User Symbols
Loading unloaded module list
...........
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
Use !analyze -v to get detailed debugging information.
BugCheck 4E, {99, 1c42b4, 3, 1d44de}
Probably caused by : memory_corruption ( nt!MiBadShareCount+4c )
Followup: MachineOwner
---------
2: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
PFN_LIST_CORRUPT (4e)
Typically caused by drivers passing bad memory descriptor lists (ie: calling
MmUnlockPages twice with the same list, etc). If a kernel debugger is
available get the stack trace.
Arguments:
Arg1: 0000000000000099, A PTE or PFN is corrupt
Arg2: 00000000001c42b4, page frame number
Arg3: 0000000000000003, current page state
Arg4: 00000000001d44de, 0
Debugging Details:
------------------
BUGCHECK_STR: 0x4E_99
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT
PROCESS_NAME: svchost.exe
CURRENT_IRQL: 2
LAST_CONTROL_TRANSFER: from fffff8000335038c to fffff800032c0740
STACK_TEXT:
fffff880`099eaf98 fffff800`0335038c : 00000000`0000004e 00000000`00000099 00000000`001c42b4 00000000`00000003 : nt!KeBugCheckEx
fffff880`099eafa0 fffff800`033329f7 : 00000000`00000000 fffff680`000296b0 00000000`00000002 00000000`00000001 : nt!MiBadShareCount+0x4c
fffff880`099eafe0 fffff800`03294c23 : fffffa80`08ef2b30 fffff700`0000aa0c 0000007f`fffffff8 fffff8a0`045003f0 : nt! ?? ::FNODOBFM::`string'+0x3223e
fffff880`099eb070 fffff800`0329368a : fffffa80`08ef2b30 fffffa80`000003c7 fffff8a0`00009a2c fffff880`00000000 : nt!MiDeleteAddressesInWorkingSet+0x307
fffff880`099eb920 fffff800`035a5dcf : fffff8a0`00fe2730 fffff880`099ebc20 00000000`00000000 fffffa80`06ebd060 : nt!MmCleanProcessAddressSpace+0x96
fffff880`099eb970 fffff800`0357e635 : 00000000`000000ff fffff800`032ab401 000007ff`fffa8000 fffffa80`0981f060 : nt!PspExitThread+0x92f
fffff880`099eba30 fffff800`0329d1db : 00000000`00000000 fffffa80`08f21350 00000000`028cfcf0 fffff880`099ebbe0 : nt!PsExitSpecialApc+0x1d
fffff880`099eba60 fffff800`0329d620 : 00000000`77bb4298 fffff880`099ebae0 fffff800`0357e74c 00000000`00000001 : nt!KiDeliverApc+0x2eb
fffff880`099ebae0 fffff800`032bfa37 : fffffa80`06ebd060 00000000`77bb4270 fffff880`000000c0 fffffa80`091409d0 : nt!KiInitiateUserApc+0x70
fffff880`099ebc20 00000000`77b017ba : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceExit+0x9c
00000000`028cfb08 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x77b017ba
STACK_COMMAND: kb
FOLLOWUP_IP:
nt!MiBadShareCount+4c
fffff800`0335038c cc int 3
SYMBOL_STACK_INDEX: 1
SYMBOL_NAME: nt!MiBadShareCount+4c
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: nt
DEBUG_FLR_IMAGE_TIMESTAMP: 4c1c44a9
IMAGE_NAME: memory_corruption
FAILURE_BUCKET_ID: X64_0x4E_99_nt!MiBadShareCount+4c
BUCKET_ID: X64_0x4E_99_nt!MiBadShareCount+4c
Followup: MachineOwner
---------
Microsoft (R) Windows Debugger Version 6.12.0002.633 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [F:\a\Minidump\D M P\DMP\122010-13728-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
Symbol search path is: SRV*c:\websymbols*http://msdl.microsoft.com/download/symbols
Executable search path is:
Windows 7 Kernel Version 7600 MP (4 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS Personal
Built by: 7600.16617.amd64fre.win7_gdr.100618-1621
Machine Name:
Kernel base = 0xfffff800`0324d000 PsLoadedModuleList = 0xfffff800`0348ae50
Debug session time: Tue Dec 21 00:09:53.205 2010 (UTC - 5:00)
System Uptime: 0 days 2:04:10.282
Loading Kernel Symbols
...............................................................
................................................................
.........................
Loading User Symbols
Loading unloaded module list
.....
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
Use !analyze -v to get detailed debugging information.
BugCheck 4E, {2, 1436ac, 21ffff, 49}
Probably caused by : dxgmms1.sys ( dxgmms1!VIDMM_SEGMENT::SafeProbeAndLockPages+229 )
Followup: MachineOwner
---------
3: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
PFN_LIST_CORRUPT (4e)
Typically caused by drivers passing bad memory descriptor lists (ie: calling
MmUnlockPages twice with the same list, etc). If a kernel debugger is
available get the stack trace.
Arguments:
Arg1: 0000000000000002, A list entry was corrupt
Arg2: 00000000001436ac, entry in list being removed
Arg3: 000000000021ffff, highest physical page number
Arg4: 0000000000000049, reference count of entry being removed
Debugging Details:
------------------
BUGCHECK_STR: 0x4E_2
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT
PROCESS_NAME: BFBC2Game.exe
CURRENT_IRQL: 2
TRAP_FRAME: fffff88006d0c2c0 -- (.trap 0xfffff88006d0c2c0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000000 rbx=0000000000000000 rcx=0000000000000000
rdx=0000000000000880 rsi=0000000000000000 rdi=0000000000000000
rip=fffff800032dd690 rsp=fffff88006d0c450 rbp=fffffa8008d0cc60
r8=fffffa800a450068 r9=0000000052c27000 r10=0000000000000880
r11=0000000000000000 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei ng nz na po cy
nt!MmProbeAndLockPages+0x130:
fffff800`032dd690 410fb601 movzx eax,byte ptr [r9] ds:a100:00000000`52c27000=??
Resetting default scope
LAST_CONTROL_TRANSFER: from fffff800032de6be to fffff800032bd740
STACK_TEXT:
fffff880`06d0c450 fffff880`02c33a25 : fffffa80`0a44d000 00000000`00000000 fffffa80`00000002 00000000`52620000 : nt!MmProbeAndLockPages+0x130
fffff880`06d0c560 fffff880`02c2e026 : fffffa80`08d0a180 fffff8a0`0b6853e0 fffff880`00000148 00000000`00880000 : dxgmms1!VIDMM_SEGMENT::SafeProbeAndLockPages+0x229
fffff880`06d0c5f0 fffff880`02c2ff65 : fffffa80`08d0a180 fffff8a0`0b6853e0 00000000`00000000 00000000`00880000 : dxgmms1!VIDMM_APERTURE_SEGMENT::LockAllocationRange+0x23e
fffff880`06d0c6a0 fffff880`02c21904 : fffffa80`08d0b680 fffff8a0`0b6853e0 00000000`3e170001 00000000`0d73ea00 : dxgmms1!VIDMM_MEMORY_SEGMENT::EvictResource+0x7a5
fffff880`06d0c810 fffff880`02c217e3 : fffffa80`08d0c000 00000000`00000000 00000000`00000000 00000000`00000000 : dxgmms1!VIDMM_GLOBAL::EvictAllAllocationInList+0x40
fffff880`06d0c850 fffff880`02c241dd : fffff8a0`124d2c70 fffff8a0`124d2c70 00000000`00000000 fffff880`00000003 : dxgmms1!VIDMM_GLOBAL::EvictAllReclaimedAllocation+0x43
fffff880`06d0c8a0 fffff880`02c1fa8f : fffff8a0`124d2c70 fffff8a0`124d2c70 fffffa80`08d0c000 fffffa80`072bf170 : dxgmms1!VIDMM_GLOBAL::AllocateResourceForPinnedAllocation+0x18d
fffff880`06d0c920 fffff880`02c1f38f : fffff880`06d0cc78 00080000`00000000 fffff880`06d0cbf0 fffff880`06d0cc88 : dxgmms1!VIDMM_GLOBAL::ProcessDeferredCommand+0x19f
fffff880`06d0ca40 fffff880`02c39231 : 00000000`00000001 fffff880`02c0b0d4 fffffa80`08cdd240 fffffa80`08cdd240 : dxgmms1!VidMmiProcessSystemCommand+0x23
fffff880`06d0ca70 fffff880`02c383bc : fffff880`06d0cbd0 00000000`00000000 fffffa80`08d2bec0 00000000`00000001 : dxgmms1!VidSchiSubmitSystemCommand+0x39
fffff880`06d0caa0 fffff880`02c0a77a : 00000000`00000000 fffffa80`08cdd240 fffffa80`08d2bec0 fffffa80`08d2bec0 : dxgmms1!VidSchiSubmitQueueCommand+0x74
fffff880`06d0cad0 fffff880`02c3a927 : fffffa80`08cf3af0 fffffa80`08cf6000 fffffa80`08d2bec0 fffffa80`6d4d6956 : dxgmms1!VidSchiSubmitQueueCommandDirect+0x1e6
fffff880`06d0cb60 fffff880`02c1f4b9 : fffffa80`00000001 fffffa80`08ce7140 fffffa80`08d0c000 fffff880`06d0cc78 : dxgmms1!VidSchiSubmitCommandPacketToQueue+0x15f
fffff880`06d0cbd0 fffff880`02c1f8dc : fffff880`06d0cd30 fffff8a0`124d2c70 fffff880`06d0cd30 fffff8a0`124d2c70 : dxgmms1!VIDMM_GLOBAL::QueueSystemCommandAndWait+0xf9
fffff880`06d0cc40 fffff880`02c1afaa : 00000000`00000000 00000000`00000000 fffffa80`08d0c000 fffff8a0`00a524e0 : dxgmms1!VIDMM_GLOBAL::QueueDeferredCommandAndWait+0x4c
fffff880`06d0ccb0 fffff880`02c01aa7 : fffff8a0`09649f90 fffff8a0`09c93740 fffff880`06d0ce20 00000000`00000020 : dxgmms1!VIDMM_GLOBAL::OpenOneAllocation+0x2da
fffff880`06d0cd90 fffff880`03b4d3a1 : fffff8a0`220275e0 fffff880`06d0d260 00000000`00000000 00000000`00000000 : dxgmms1!VidMmOpenAllocation+0xeb
fffff880`06d0cde0 fffff880`03b46554 : fffff880`06d0d048 fffff8a0`0b09ac10 fffff880`06d0d220 fffff880`06d0d220 : dxgkrnl!DXGDEVICE::CreateVidMmAllocations<_DXGK_ALLOCATIONINFO>+0x28d
fffff880`06d0ce70 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : dxgkrnl!DXGDEVICE::CreateAllocation+0xca8
STACK_COMMAND: .trap 0xfffff88006d0c2c0 ; kb
FOLLOWUP_IP:
dxgmms1!VIDMM_SEGMENT::SafeProbeAndLockPages+229
fffff880`02c33a25 4c8b1d8cd6fdff mov r11,qword ptr [dxgmms1!_imp_g_loggerInfo (fffff880`02c110b8)]
SYMBOL_STACK_INDEX: 1
SYMBOL_NAME: dxgmms1!VIDMM_SEGMENT::SafeProbeAndLockPages+229
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: dxgmms1
IMAGE_NAME: dxgmms1.sys
DEBUG_FLR_IMAGE_TIMESTAMP: 4a5bc578
FAILURE_BUCKET_ID: X64_0x4E_2_dxgmms1!VIDMM_SEGMENT::SafeProbeAndLockPages+229
BUCKET_ID: X64_0x4E_2_dxgmms1!VIDMM_SEGMENT::SafeProbeAndLockPages+229
Followup: MachineOwner
---------
Microsoft (R) Windows Debugger Version 6.12.0002.633 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [F:\a\Minidump\D M P\DMP\122810-14383-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
Symbol search path is: SRV*c:\websymbols*http://msdl.microsoft.com/download/symbols
Executable search path is:
Windows 7 Kernel Version 7600 MP (4 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS Personal
Built by: 7600.16617.amd64fre.win7_gdr.100618-1621
Machine Name:
Kernel base = 0xfffff800`0321b000 PsLoadedModuleList = 0xfffff800`03458e50
Debug session time: Tue Dec 28 17:17:17.197 2010 (UTC - 5:00)
System Uptime: 0 days 1:52:36.664
Loading Kernel Symbols
...............................................................
................................................................
.........................
Loading User Symbols
Loading unloaded module list
.....
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
Use !analyze -v to get detailed debugging information.
BugCheck 4E, {99, 21ec02, 6, b7}
Probably caused by : memory_corruption ( nt!MiBadShareCount+4c )
Followup: MachineOwner
---------
2: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
PFN_LIST_CORRUPT (4e)
Typically caused by drivers passing bad memory descriptor lists (ie: calling
MmUnlockPages twice with the same list, etc). If a kernel debugger is
available get the stack trace.
Arguments:
Arg1: 0000000000000099, A PTE or PFN is corrupt
Arg2: 000000000021ec02, page frame number
Arg3: 0000000000000006, current page state
Arg4: 00000000000000b7, 0
Debugging Details:
------------------
BUGCHECK_STR: 0x4E_99
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT
PROCESS_NAME: System
CURRENT_IRQL: 0
LAST_CONTROL_TRANSFER: from fffff8000331b38c to fffff8000328b740
STACK_TEXT:
fffff880`0a454968 fffff800`0331b38c : 00000000`0000004e 00000000`00000099 00000000`0021ec02 00000000`00000006 : nt!KeBugCheckEx
fffff880`0a454970 fffff800`033bd9e8 : 00000000`00000000 fffffa80`06604180 00000000`00000000 00000000`00000001 : nt!MiBadShareCount+0x4c
fffff880`0a4549b0 fffff800`033c087c : fffffa80`07a02000 00000000`00000000 fffff6fb`7ea001e8 00000000`00000001 : nt!MiFreePoolPages+0xaa8
fffff880`0a454ac0 fffff800`036dc6ae : 00000000`00000000 fffffa80`07a22000 fffffa80`63416d4d fffffa80`00000000 : nt!ExFreePoolWithTag+0x7cc
fffff880`0a454b70 fffff800`036fdcd0 : fffffa80`09a8f401 00000000`00000080 fffffa80`06705040 fffff800`03419568 : nt!PfpFlushBuffers+0x23e
fffff880`0a454c10 fffff800`0352fc06 : ffffffff`ff676980 fffffa80`09a8f410 fffff880`0a454db0 fffffa80`09a8f410 : nt!PfTLoggingWorker+0xe0
fffff880`0a454d40 fffff800`03269c26 : fffff800`03405e80 fffffa80`09a8f410 fffff800`03413c40 fffff880`01239a90 : nt!PspSystemThreadStartup+0x5a
fffff880`0a454d80 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KxStartSystemThread+0x16
STACK_COMMAND: kb
FOLLOWUP_IP:
nt!MiBadShareCount+4c
fffff800`0331b38c cc int 3
SYMBOL_STACK_INDEX: 1
SYMBOL_NAME: nt!MiBadShareCount+4c
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: nt
DEBUG_FLR_IMAGE_TIMESTAMP: 4c1c44a9
IMAGE_NAME: memory_corruption
FAILURE_BUCKET_ID: X64_0x4E_99_nt!MiBadShareCount+4c
BUCKET_ID: X64_0x4E_99_nt!MiBadShareCount+4c
Followup: MachineOwner
---------