Microsoft (R) Windows Debugger Version 6.12.0002.633 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [F:\a\Minidump\D M P\DMP\022011-20935-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
Symbol search path is: SRV*c:\websymbols*http://msdl.microsoft.com/download/symbols
Executable search path is:
Windows 7 Kernel Version 7600 MP (2 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS
Built by: 7600.16695.amd64fre.win7_gdr.101026-1503
Machine Name:
Kernel base = 0xfffff800`0341d000 PsLoadedModuleList = 0xfffff800`0365ae50
Debug session time: Sun Feb 20 10:18:37.787 2011 (UTC - 5:00)
System Uptime: 1 days 18:02:27.807
Loading Kernel Symbols
...............................................................
................................................................
....................................
Loading User Symbols
Loading unloaded module list
...........
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
Use !analyze -v to get detailed debugging information.
BugCheck 1A, {41790, fffffa8001f65d20, ffff, 0}
Probably caused by : ntkrnlmp.exe ( nt! ?? ::FNODOBFM::`string'+33906 )
Followup: MachineOwner
---------
1: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
MEMORY_MANAGEMENT (1a)
# Any other values for parameter 1 must be individually examined.
Arguments:
Arg1: 0000000000041790, The subtype of the bugcheck.
Arg2: fffffa8001f65d20
Arg3: 000000000000ffff
Arg4: 0000000000000000
Debugging Details:
------------------
BUGCHECK_STR: 0x1a_41790
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT
PROCESS_NAME: AvastSvc.exe
CURRENT_IRQL: 0
LAST_CONTROL_TRANSFER: from fffff80003500f9e to fffff8000348d740
STACK_TEXT:
fffff880`035c57a8 fffff800`03500f9e : 00000000`0000001a 00000000`00041790 fffffa80`01f65d20 00000000`0000ffff : nt!KeBugCheckEx
fffff880`035c57b0 fffff800`034c0df9 : fffffa80`00000000 00000000`652e9fff 00000000`00000000 00000000`00000000 : nt! ?? ::FNODOBFM::`string'+0x33906
fffff880`035c5970 fffff800`0346080c : ffffffff`ffffffff 00000000`00000000 00000000`00000000 00000000`00000000 : nt!MiRemoveMappedView+0xd9
fffff880`035c5a90 fffff800`03770abf : fffff8a0`010a0060 00000000`00000001 00000000`00000000 fffffa80`05b27b60 : nt!MmCleanProcessAddressSpace+0x228
fffff880`035c5ae0 fffff800`0374995b : 00000000`00000000 00000000`00000001 00000000`fffdb000 00000000`00000000 : nt!PspExitThread+0x92f
fffff880`035c5ba0 fffff800`0348c993 : fffffa80`05b62060 00000000`00000000 00000000`fffdb001 fffffa80`05b27b60 : nt!NtTerminateProcess+0x25b
fffff880`035c5c20 00000000`77c1f97a : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x13
00000000`0008e308 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x77c1f97a
STACK_COMMAND: kb
FOLLOWUP_IP:
nt! ?? ::FNODOBFM::`string'+33906
fffff800`03500f9e cc int 3
SYMBOL_STACK_INDEX: 1
SYMBOL_NAME: nt! ?? ::FNODOBFM::`string'+33906
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: nt
IMAGE_NAME: ntkrnlmp.exe
DEBUG_FLR_IMAGE_TIMESTAMP: 4cc791bd
FAILURE_BUCKET_ID: X64_0x1a_41790_nt!_??_::FNODOBFM::_string_+33906
BUCKET_ID: X64_0x1a_41790_nt!_??_::FNODOBFM::_string_+33906
Followup: MachineOwner
---------
Microsoft (R) Windows Debugger Version 6.12.0002.633 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [F:\a\Minidump\D M P\DMP\030811-19390-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
Symbol search path is: SRV*c:\websymbols*http://msdl.microsoft.com/download/symbols
Executable search path is:
Windows 7 Kernel Version 7600 MP (2 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS
Built by: 7600.16695.amd64fre.win7_gdr.101026-1503
Machine Name:
Kernel base = 0xfffff800`03451000 PsLoadedModuleList = 0xfffff800`0368ee50
Debug session time: Tue Mar 8 16:18:44.887 2011 (UTC - 5:00)
System Uptime: 2 days 5:53:44.417
Loading Kernel Symbols
...............................................................
................................................................
......................................
Loading User Symbols
Loading unloaded module list
.......
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
Use !analyze -v to get detailed debugging information.
BugCheck A, {80000000, 2, 1, fffff800035020a2}
Probably caused by : afd.sys ( afd!AfdPoll32+301 )
Followup: MachineOwner
---------
1: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
IRQL_NOT_LESS_OR_EQUAL (a)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high. This is usually
caused by drivers using improper addresses.
If a kernel debugger is available get the stack backtrace.
Arguments:
Arg1: 0000000080000000, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000001, bitfield :
bit 0 : value 0 = read operation, 1 = write operation
bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
Arg4: fffff800035020a2, address which referenced memory
Debugging Details:
------------------
WRITE_ADDRESS: GetPointerFromAddress: unable to read from fffff800036f90e0
0000000080000000
CURRENT_IRQL: 2
FAULTING_IP:
nt!KxWaitForLockOwnerShip+12
fffff800`035020a2 48890a mov qword ptr [rdx],rcx
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT
BUGCHECK_STR: 0xA
PROCESS_NAME: Skype.exe
TRAP_FRAME: fffff880028a36c0 -- (.trap 0xfffff880028a36c0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000000 rbx=0000000000000000 rcx=fffff880028a3970
rdx=0000000080000000 rsi=0000000000000000 rdi=0000000000000000
rip=fffff800035020a2 rsp=fffff880028a3850 rbp=00000000000007ff
r8=fffff880028a3970 r9=0000000000000018 r10=fffffa80036dac90
r11=000000000016019f r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei ng nz na po nc
nt!KxWaitForLockOwnerShip+0x12:
fffff800`035020a2 48890a mov qword ptr [rdx],rcx ds:be80:00000000`80000000=????????????????
Resetting default scope
LAST_CONTROL_TRANSFER: from fffff800034c0ca9 to fffff800034c1740
STACK_TEXT:
fffff880`028a3578 fffff800`034c0ca9 : 00000000`0000000a 00000000`80000000 00000000`00000002 00000000`00000001 : nt!KeBugCheckEx
fffff880`028a3580 fffff800`034bf920 : 00000000`00000000 ffffffff`c4653600 fffffa80`0434f440 fffffa80`040e8060 : nt!KiBugCheckDispatch+0x69
fffff880`028a36c0 fffff800`035020a2 : fffffa80`07e63750 00000000`00000000 fffffa80`04301830 fffffa80`07e63530 : nt!KiPageFault+0x260
fffff880`028a3850 fffff800`034d2f2d : ffffffff`c4653600 fffff880`00000000 fffffa80`036dac90 fffffa80`04301901 : nt!KxWaitForLockOwnerShip+0x12
fffff880`028a3880 fffff880`02d3f8c1 : 00000000`000007ff ffffffff`c4653600 fffffa80`04301830 fffff800`034d0b7c : nt!KeAcquireInStackQueuedSpinLock+0x8d
fffff880`028a38d0 fffff880`02d2fcf5 : fffffa80`0489da00 fffffa80`07e63500 00000000`00000001 00000000`00000000 : afd!AfdPoll32+0x301
fffff880`028a39e0 fffff800`037da547 : fffffa80`054a8f20 fffff880`028a3ca0 fffffa80`04301a20 fffffa80`04301830 : afd! ?? ::GFJBLGFE::`string'+0x1e95
fffff880`028a3a10 fffff800`037dada6 : fffff880`009eb180 00000000`000003c0 00000000`00000001 00000000`00000000 : nt!IopXxxControlFile+0x607
fffff880`028a3b40 fffff800`034c0993 : 00000000`00000000 fffff800`037dbfa0 fffff880`028a3ca0 00000000`00000000 : nt!NtDeviceIoControlFile+0x56
fffff880`028a3bb0 00000000`75612dd9 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x13
00000000`04f3f0f8 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x75612dd9
STACK_COMMAND: kb
FOLLOWUP_IP:
afd!AfdPoll32+301
fffff880`02d3f8c1 4533c9 xor r9d,r9d
SYMBOL_STACK_INDEX: 5
SYMBOL_NAME: afd!AfdPoll32+301
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: afd
IMAGE_NAME: afd.sys
DEBUG_FLR_IMAGE_TIMESTAMP: 4a5bc184
FAILURE_BUCKET_ID: X64_0xA_afd!AfdPoll32+301
BUCKET_ID: X64_0xA_afd!AfdPoll32+301
Followup: MachineOwner
---------
Microsoft (R) Windows Debugger Version 6.12.0002.633 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [F:\a\Minidump\D M P\DMP\030611-18283-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
Symbol search path is: SRV*c:\websymbols*http://msdl.microsoft.com/download/symbols
Executable search path is:
Windows 7 Kernel Version 7600 MP (2 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS
Built by: 7600.16695.amd64fre.win7_gdr.101026-1503
Machine Name:
Kernel base = 0xfffff800`0344d000 PsLoadedModuleList = 0xfffff800`0368ae50
Debug session time: Sun Mar 6 10:21:47.677 2011 (UTC - 5:00)
System Uptime: 0 days 15:15:57.207
Loading Kernel Symbols
...............................................................
................................................................
.....................................
Loading User Symbols
Loading unloaded module list
.....
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
Use !analyze -v to get detailed debugging information.
BugCheck 50, {fffffa8083dcaf08, 1, fffff88003c20ff3, 5}
Could not read faulting driver name
Probably caused by : dxgmms1.sys ( dxgmms1!VIDMM_GLOBAL::ReferenceAllocationForSubmission+a3 )
Followup: MachineOwner
---------
0: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
PAGE_FAULT_IN_NONPAGED_AREA (50)
Invalid system memory was referenced. This cannot be protected by try-except,
it must be protected by a Probe. Typically the address is just plain bad or it
is pointing at freed memory.
Arguments:
Arg1: fffffa8083dcaf08, memory referenced.
Arg2: 0000000000000001, value 0 = read operation, 1 = write operation.
Arg3: fffff88003c20ff3, If non-zero, the instruction address which referenced the bad memory
address.
Arg4: 0000000000000005, (reserved)
Debugging Details:
------------------
Could not read faulting driver name
WRITE_ADDRESS: GetPointerFromAddress: unable to read from fffff800036f50e0
fffffa8083dcaf08
FAULTING_IP:
dxgmms1!VIDMM_GLOBAL::ReferenceAllocationForSubmission+a3
fffff880`03c20ff3 48894108 mov qword ptr [rcx+8],rax
MM_INTERNAL_CODE: 5
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT
BUGCHECK_STR: 0x50
PROCESS_NAME: System
CURRENT_IRQL: 0
TRAP_FRAME: fffff880021bd740 -- (.trap 0xfffff880021bd740)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=fffffa80037a8d00 rbx=0000000000000000 rcx=fffffa8083dcaf00
rdx=fffff8a0034c03f0 rsi=0000000000000000 rdi=0000000000000000
rip=fffff88003c20ff3 rsp=fffff880021bd8d0 rbp=0000000000000000
r8=fffffa8005449380 r9=0000000000000000 r10=0000000000000000
r11=fffffa80057563c0 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei ng nz na po nc
dxgmms1!VIDMM_GLOBAL::ReferenceAllocationForSubmission+0xa3:
fffff880`03c20ff3 48894108 mov qword ptr [rcx+8],rax ds:0002:fffffa80`83dcaf08=????????????????
Resetting default scope
LAST_CONTROL_TRANSFER: from fffff8000353c8c1 to fffff800034bd740
STACK_TEXT:
fffff880`021bd5d8 fffff800`0353c8c1 : 00000000`00000050 fffffa80`83dcaf08 00000000`00000001 fffff880`021bd740 : nt!KeBugCheckEx
fffff880`021bd5e0 fffff800`034bb82e : 00000000`00000001 fffff8a0`02baf010 00000000`00000000 00000000`00000000 : nt! ?? ::FNODOBFM::`string'+0x40e8b
fffff880`021bd740 fffff880`03c20ff3 : fffff8a0`01a6edc0 fffffa80`05b92f70 fffffa80`05755000 00000000`00000000 : nt!KiPageFault+0x16e
fffff880`021bd8d0 fffff880`03c1e8af : 00000000`00000000 fffffa80`03973028 00000000`00000013 fffffa80`03b8a080 : dxgmms1!VIDMM_GLOBAL::ReferenceAllocationForSubmission+0xa3
fffff880`021bd910 fffff880`03c3865d : 00000000`00000000 fffff8a0`0b02bb30 fffffa80`00000000 fffffa80`05a04e10 : dxgmms1!VIDMM_GLOBAL::PrepareDmaBuffer+0xe1b
fffff880`021bdae0 fffff880`03c38398 : fffff800`047e3080 fffff880`03c37d00 fffffa80`00000000 fffffa80`00000000 : dxgmms1!VidSchiSubmitRenderCommand+0x241
fffff880`021bdcd0 fffff880`03c37e96 : 00000000`00000000 fffffa80`04f96560 00000000`00000080 fffffa80`051b6410 : dxgmms1!VidSchiSubmitQueueCommand+0x50
fffff880`021bdd00 fffff800`037607c6 : 00000000`03bc47d7 fffffa80`0572f210 fffffa80`0366b890 fffffa80`0572f210 : dxgmms1!VidSchiWorkerThread+0xd6
fffff880`021bdd40 fffff800`0349bc26 : fffff800`03637e80 fffffa80`0572f210 fffff800`03645c40 63517437`78625133 : nt!PspSystemThreadStartup+0x5a
fffff880`021bdd80 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KxStartSystemThread+0x16
STACK_COMMAND: kb
FOLLOWUP_IP:
dxgmms1!VIDMM_GLOBAL::ReferenceAllocationForSubmission+a3
fffff880`03c20ff3 48894108 mov qword ptr [rcx+8],rax
SYMBOL_STACK_INDEX: 3
SYMBOL_NAME: dxgmms1!VIDMM_GLOBAL::ReferenceAllocationForSubmission+a3
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: dxgmms1
IMAGE_NAME: dxgmms1.sys
DEBUG_FLR_IMAGE_TIMESTAMP: 4d3fa174
FAILURE_BUCKET_ID: X64_0x50_dxgmms1!VIDMM_GLOBAL::ReferenceAllocationForSubmission+a3
BUCKET_ID: X64_0x50_dxgmms1!VIDMM_GLOBAL::ReferenceAllocationForSubmission+a3
Followup: MachineOwner
---------
Microsoft (R) Windows Debugger Version 6.12.0002.633 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [F:\a\Minidump\D M P\DMP\031011-24164-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
Symbol search path is: SRV*c:\websymbols*http://msdl.microsoft.com/download/symbols
Executable search path is:
Windows 7 Kernel Version 7600 MP (2 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS
Built by: 7600.16695.amd64fre.win7_gdr.101026-1503
Machine Name:
Kernel base = 0xfffff800`0340d000 PsLoadedModuleList = 0xfffff800`0364ae50
Debug session time: Thu Mar 10 13:27:35.668 2011 (UTC - 5:00)
System Uptime: 0 days 0:26:17.213
Loading Kernel Symbols
...............................................................
................................................................
...................................
Loading User Symbols
Loading unloaded module list
.....
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
Use !analyze -v to get detailed debugging information.
BugCheck A, {fffff808036b58f8, c, 0, fffff8000348b925}
Probably caused by : ntkrnlmp.exe ( nt!KiIpiSendRequest+1d5 )
Followup: MachineOwner
---------
0: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
IRQL_NOT_LESS_OR_EQUAL (a)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high. This is usually
caused by drivers using improper addresses.
If a kernel debugger is available get the stack backtrace.
Arguments:
Arg1: fffff808036b58f8, memory referenced
Arg2: 000000000000000c, IRQL
Arg3: 0000000000000000, bitfield :
bit 0 : value 0 = read operation, 1 = write operation
bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
Arg4: fffff8000348b925, address which referenced memory
Debugging Details:
------------------
READ_ADDRESS: GetPointerFromAddress: unable to read from fffff800036b50e0
fffff808036b58f8
CURRENT_IRQL: c
FAULTING_IP:
nt!KiIpiSendRequest+1d5
fffff800`0348b925 4d8b9cf600892a00 mov r11,qword ptr [r14+rsi*8+2A8900h]
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: VERIFIER_ENABLED_VISTA_MINIDUMP
BUGCHECK_STR: 0xA
PROCESS_NAME: svchost.exe
TRAP_FRAME: fffff880031865d0 -- (.trap 0xfffff880031865d0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=00000000ffffffff rbx=0000000000000000 rcx=000000000000001f
rdx=0000000000000001 rsi=0000000000000000 rdi=0000000000000000
rip=fffff8000348b925 rsp=fffff88003186760 rbp=0000000000000000
r8=000000000000001f r9=0000000000000000 r10=0000000000000000
r11=0000000000000000 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei ng nz na po nc
nt!KiIpiSendRequest+0x1d5:
fffff800`0348b925 4d8b9cf600892a00 mov r11,qword ptr [r14+rsi*8+2A8900h] ds:00000000`002a8900=????????????????
Resetting default scope
LAST_CONTROL_TRANSFER: from fffff8000347cca9 to fffff8000347d740
STACK_TEXT:
fffff880`03186488 fffff800`0347cca9 : 00000000`0000000a fffff808`036b58f8 00000000`0000000c 00000000`00000000 : nt!KeBugCheckEx
fffff880`03186490 fffff800`0347b920 : fffff6fd`40030ac0 fffff800`035f7e80 fffff800`00000000 00000000`00000000 : nt!KiBugCheckDispatch+0x69
fffff880`031865d0 fffff800`0348b925 : 00000000`00000293 fffff800`03911dfe fffff880`03186770 fffff880`03181000 : nt!KiPageFault+0x260
fffff880`03186760 fffff800`03490cc4 : fffff880`031868d8 fffff800`00000000 fffff880`031868d8 fffffa80`0a681ea0 : nt!KiIpiSendRequest+0x1d5
fffff880`03186820 fffff800`0348b731 : 00000000`00000000 00000000`00000000 00000000`00000001 fffff800`0360c888 : nt!KiIpiSendRequestEx+0x84
fffff880`03186860 fffff800`0349148b : 00000000`00003daf 00000000`00000001 00000000`00000000 00000000`00003dae : nt!KeFlushMultipleRangeTb+0x381
fffff880`03186930 fffff800`034ffa5e : fffffa80`063beec8 fffff880`00000001 00000000`00000001 fffff880`03186bb0 : nt!MiAgeWorkingSet+0x36b
fffff880`03186ae0 fffff800`03491ee2 : 00000000`0000062a 00000000`00000000 fffffa80`00000000 00000000`00000001 : nt! ?? ::FNODOBFM::`string'+0x496d6
fffff880`03186b80 fffff800`03492173 : 00000000`00000008 fffff880`03186c10 00000000`00000001 fffffa80`00000000 : nt!MmWorkingSetManager+0x6e
fffff880`03186bd0 fffff800`037207c6 : fffffa80`0371f760 00000000`00000080 fffffa80`036f6040 00000000`00000001 : nt!KeBalanceSetManager+0x1c3
fffff880`03186d40 fffff800`0345bc26 : fffff800`035f7e80 fffffa80`0371f760 fffff800`03605c40 00001000`00000000 : nt!PspSystemThreadStartup+0x5a
fffff880`03186d80 00000000`00000000 : fffff880`03187000 fffff880`03181000 fffff880`03186820 00000000`00000000 : nt!KxStartSystemThread+0x16
STACK_COMMAND: kb
FOLLOWUP_IP:
nt!KiIpiSendRequest+1d5
fffff800`0348b925 4d8b9cf600892a00 mov r11,qword ptr [r14+rsi*8+2A8900h]
SYMBOL_STACK_INDEX: 3
SYMBOL_NAME: nt!KiIpiSendRequest+1d5
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: nt
IMAGE_NAME: ntkrnlmp.exe
DEBUG_FLR_IMAGE_TIMESTAMP: 4cc791bd
FAILURE_BUCKET_ID: X64_0xA_VRF_nt!KiIpiSendRequest+1d5
BUCKET_ID: X64_0xA_VRF_nt!KiIpiSendRequest+1d5
Followup: MachineOwner
---------