Microsoft (R) Windows Debugger Version 6.12.0002.633 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [F:\a\Minidump\D M P\DMP\020111-40919-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
Symbol search path is: SRV*c:\websymbols*http://msdl.microsoft.com/download/symbols
Executable search path is:
Windows 7 Kernel Version 7600 MP (4 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS
Built by: 7600.16617.amd64fre.win7_gdr.100618-1621
Machine Name:
Kernel base = 0xfffff800`02a1d000 PsLoadedModuleList = 0xfffff800`02c5ae50
Debug session time: Tue Feb 1 14:52:27.286 2011 (UTC - 5:00)
System Uptime: 0 days 0:12:50.284
Loading Kernel Symbols
...............................................................
................................................................
................
Loading User Symbols
Loading unloaded module list
....
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
Use !analyze -v to get detailed debugging information.
BugCheck D1, {a0b1400, b, 0, fffff880051365cd}
Unable to load image \SystemRoot\system32\DRIVERS\atikmpag.sys, Win32 error 0n2
*** WARNING: Unable to verify timestamp for atikmpag.sys
*** ERROR: Module load completed but symbols could not be loaded for atikmpag.sys
Probably caused by : hardware ( dxgmms1!VidSchiProcessIsrCompletedPacket+14d )
Followup: MachineOwner
---------
2: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
DRIVER_IRQL_NOT_LESS_OR_EQUAL (d1)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high. This is usually
caused by drivers using improper addresses.
If kernel debugger is available get stack backtrace.
Arguments:
Arg1: 000000000a0b1400, memory referenced
Arg2: 000000000000000b, IRQL
Arg3: 0000000000000000, value 0 = read operation, 1 = write operation
Arg4: fffff880051365cd, address which referenced memory
Debugging Details:
------------------
READ_ADDRESS: GetPointerFromAddress: unable to read from fffff80002cc50e0
000000000a0b1400
CURRENT_IRQL: b
FAULTING_IP:
dxgmms1!VidSchiProcessIsrCompletedPacket+14d
fffff880`051365cd 0000 add byte ptr [rax],al
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT
BUGCHECK_STR: 0xD1
PROCESS_NAME: System
TRAP_FRAME: fffff88002f8b1d0 -- (.trap 0xfffff88002f8b1d0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=000000000a0b1400 rbx=0000000000000000 rcx=fffffa8003e1b540
rdx=fffffa8003d6bcc0 rsi=0000000000000000 rdi=0000000000000000
rip=fffff880051365cd rsp=fffff88002f8b368 rbp=fffffa8005acd410
r8=0000000000000000 r9=000000000023c3b1 r10=fffffa8000000000
r11=000000006ba95afb r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei pl nz na po nc
dxgmms1!VidSchiProcessIsrCompletedPacket+0x14d:
fffff880`051365cd 0000 add byte ptr [rax],al ds:0004:00000000`0a0b1400=??
Resetting default scope
MISALIGNED_IP:
dxgmms1!VidSchiProcessIsrCompletedPacket+14d
fffff880`051365cd 0000 add byte ptr [rax],al
LAST_CONTROL_TRANSFER: from fffff80002a8cca9 to fffff80002a8d740
STACK_TEXT:
fffff880`02f8b088 fffff800`02a8cca9 : 00000000`0000000a 00000000`0a0b1400 00000000`0000000b 00000000`00000000 : nt!KeBugCheckEx
fffff880`02f8b090 fffff800`02a8b920 : 00000000`00000000 fffffa80`04d4f4e0 fffff880`02f8b5c8 fffff880`0513a4eb : nt!KiBugCheckDispatch+0x69
fffff880`02f8b1d0 fffff880`051365cd : 00000000`0a0b1400 00000000`0023c3b1 fffffa80`04d4f4e0 fffffa80`05acd410 : nt!KiPageFault+0x260
fffff880`02f8b368 fffffa80`05acd410 : fffff880`05136172 fffffa80`04d4e000 00000000`00000000 00000000`00000001 : dxgmms1!VidSchiProcessIsrCompletedPacket+0x14d
fffff880`02f8b3f8 fffff880`05136172 : fffffa80`04d4e000 00000000`00000000 00000000`00000001 fffff880`02f8b500 : 0xfffffa80`05acd410
fffff880`02f8b400 fffff880`05135f76 : 00000000`000305a6 00000000`00000000 fffffa80`05b45000 00000000`00000001 : dxgmms1!VidSchDdiNotifyInterruptWorker+0x1ea
fffff880`02f8b450 fffff880`0503d13f : fffffa80`0511f040 fffffa80`05acd410 fffffa80`05b45000 fffff880`02f8b4f0 : dxgmms1!VidSchDdiNotifyInterrupt+0x9e
fffff880`02f8b480 fffff880`03b29b3e : fffff880`02f63180 fffffa80`0510f040 00000000`00003700 00000000`00000000 : dxgkrnl!DxgNotifyInterruptCB+0x83
fffff880`02f8b4b0 fffff880`02f63180 : fffffa80`0510f040 00000000`00003700 00000000`00000000 00000000`00002700 : atikmpag+0x4b3e
fffff880`02f8b4b8 fffffa80`0510f040 : 00000000`00003700 00000000`00000000 00000000`00002700 00000000`00000006 : 0xfffff880`02f63180
fffff880`02f8b4c0 00000000`00003700 : 00000000`00000000 00000000`00002700 00000000`00000006 fffffa80`03e1b540 : 0xfffffa80`0510f040
fffff880`02f8b4c8 00000000`00000000 : 00000000`00002700 00000000`00000006 fffffa80`03e1b540 fffffa80`060ac738 : 0x3700
STACK_COMMAND: kb
FOLLOWUP_IP:
dxgmms1!VidSchiProcessIsrCompletedPacket+14d
fffff880`051365cd 0000 add byte ptr [rax],al
SYMBOL_STACK_INDEX: 3
SYMBOL_NAME: dxgmms1!VidSchiProcessIsrCompletedPacket+14d
FOLLOWUP_NAME: MachineOwner
IMAGE_NAME: hardware
DEBUG_FLR_IMAGE_TIMESTAMP: 0
MODULE_NAME: hardware
FAILURE_BUCKET_ID: X64_IP_MISALIGNED_dxgmms1.sys
BUCKET_ID: X64_IP_MISALIGNED_dxgmms1.sys
Followup: MachineOwner
---------
Microsoft (R) Windows Debugger Version 6.12.0002.633 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [F:\a\Minidump\D M P\DMP\020211-39093-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
Symbol search path is: SRV*c:\websymbols*http://msdl.microsoft.com/download/symbols
Executable search path is:
Windows 7 Kernel Version 7600 MP (4 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS
Built by: 7600.16617.amd64fre.win7_gdr.100618-1621
Machine Name:
Kernel base = 0xfffff800`02a5a000 PsLoadedModuleList = 0xfffff800`02c97e50
Debug session time: Wed Feb 2 15:02:40.666 2011 (UTC - 5:00)
System Uptime: 0 days 0:13:27.663
Loading Kernel Symbols
.
Press ctrl-c (cdb, kd, ntsd) or ctrl-break (windbg) to abort symbol loads that take too long.
Run !sym noisy before .reload to track down problems loading symbols.
..............................................................
................................................................
................
Loading User Symbols
Loading unloaded module list
....
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
Use !analyze -v to get detailed debugging information.
BugCheck 50, {fffff8805fdbf103, 1, fffff80002da1e3e, 5}
Could not read faulting driver name
Probably caused by : ntkrnlmp.exe ( nt!CmQueryKey+92 )
Followup: MachineOwner
---------
0: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
PAGE_FAULT_IN_NONPAGED_AREA (50)
Invalid system memory was referenced. This cannot be protected by try-except,
it must be protected by a Probe. Typically the address is just plain bad or it
is pointing at freed memory.
Arguments:
Arg1: fffff8805fdbf103, memory referenced.
Arg2: 0000000000000001, value 0 = read operation, 1 = write operation.
Arg3: fffff80002da1e3e, If non-zero, the instruction address which referenced the bad memory
address.
Arg4: 0000000000000005, (reserved)
Debugging Details:
------------------
Could not read faulting driver name
WRITE_ADDRESS: GetPointerFromAddress: unable to read from fffff80002d020e0
fffff8805fdbf103
FAULTING_IP:
nt!CmQueryKey+92
fffff800`02da1e3e 8984249a000000 mov dword ptr [rsp+9Ah],eax
MM_INTERNAL_CODE: 5
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT
BUGCHECK_STR: 0x50
PROCESS_NAME: audiodg.exe
CURRENT_IRQL: 0
TRAP_FRAME: fffff88005db7700 -- (.trap 0xfffff88005db7700)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000000 rbx=0000000000000000 rcx=fffff88005db79c8
rdx=0000000000000000 rsi=0000000000000000 rdi=0000000000000000
rip=fffff80002da1e3e rsp=fffff88005db7890 rbp=fffff88005db7ca0
r8=0000000000000000 r9=0000000000000000 r10=fffffa80039f73c0
r11=0000000000020019 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei pl zr na po nc
nt!CmQueryKey+0x92:
fffff800`02da1e3e 8984249a000000 mov dword ptr [rsp+9Ah],eax ss:0018:fffff880`05db792a=f80002da
Resetting default scope
LAST_CONTROL_TRANSFER: from fffff80002b498c1 to fffff80002aca740
STACK_TEXT:
fffff880`05db7598 fffff800`02b498c1 : 00000000`00000050 fffff880`5fdbf103 00000000`00000001 fffff880`05db7700 : nt!KeBugCheckEx
fffff880`05db75a0 fffff800`02ac882e : 00000000`00000001 00000000`00000000 00000000`00000000 fffff8a0`001d84a8 : nt! ?? ::FNODOBFM::`string'+0x40e8b
fffff880`05db7700 fffff800`02da1e3e : 00000000`00000000 fffff800`02daa7ff 00000000`00000000 00000000`01d7fc40 : nt!KiPageFault+0x16e
fffff880`05db7890 fffff800`02da7372 : fffffa80`044ff700 00000000`00000000 fffffa80`039f73c0 00000000`00000001 : nt!CmQueryKey+0x92
fffff880`05db7a50 fffff800`02ac9993 : fffffa80`044ff660 fffffa80`00000007 00000000`0203f418 fffff800`02de0400 : nt!NtQueryKey+0x262
fffff880`05db7bb0 00000000`76e3feba : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x13
00000000`0203f3f8 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x76e3feba
STACK_COMMAND: kb
FOLLOWUP_IP:
nt!CmQueryKey+92
fffff800`02da1e3e 8984249a000000 mov dword ptr [rsp+9Ah],eax
SYMBOL_STACK_INDEX: 3
SYMBOL_NAME: nt!CmQueryKey+92
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: nt
IMAGE_NAME: ntkrnlmp.exe
DEBUG_FLR_IMAGE_TIMESTAMP: 4c1c44a9
FAILURE_BUCKET_ID: X64_0x50_nt!CmQueryKey+92
BUCKET_ID: X64_0x50_nt!CmQueryKey+92
Followup: MachineOwner
---------
Microsoft (R) Windows Debugger Version 6.12.0002.633 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [F:\a\Minidump\D M P\DMP\020211-51168-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
Symbol search path is: SRV*c:\websymbols*http://msdl.microsoft.com/download/symbols
Executable search path is:
Windows 7 Kernel Version 7600 MP (4 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS
Built by: 7600.16617.amd64fre.win7_gdr.100618-1621
Machine Name:
Kernel base = 0xfffff800`02a4e000 PsLoadedModuleList = 0xfffff800`02c8be50
Debug session time: Wed Feb 2 15:10:13.277 2011 (UTC - 5:00)
System Uptime: 0 days 0:06:54.275
Loading Kernel Symbols
...............................................................
................................................................
................
Loading User Symbols
Loading unloaded module list
....
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
Use !analyze -v to get detailed debugging information.
BugCheck 3B, {c0000005, fffff80002accdbe, fffff8800670acf0, 0}
Probably caused by : memory_corruption ( nt!MmMapLockedPagesSpecifyCache+3e )
Followup: MachineOwner
---------
2: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
SYSTEM_SERVICE_EXCEPTION (3b)
An exception happened while executing a system service routine.
Arguments:
Arg1: 00000000c0000005, Exception code that caused the bugcheck
Arg2: fffff80002accdbe, Address of the instruction which caused the bugcheck
Arg3: fffff8800670acf0, Address of the context record for the exception that caused the bugcheck
Arg4: 0000000000000000, zero.
Debugging Details:
------------------
EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - The instruction at 0x%08lx referenced memory at 0x%08lx. The memory could not be %s.
FAULTING_IP:
nt!MmMapLockedPagesSpecifyCache+3e
fffff800`02accdbe 44898424d0000000 mov dword ptr [rsp+0D0h],r8d
CONTEXT: fffff8800670acf0 -- (.cxr 0xfffff8800670acf0)
rax=0000000000000000 rbx=fffff8800670b840 rcx=fffff8800670b840
rdx=0000000000000001 rsi=0000000000001000 rdi=0000000000000001
rip=fffff80002accdbe rsp=fffff8800670b6c0 rbp=fffff8800670bca0
r8=0000000000000001 r9=0000000000000000 r10=0000000000000000
r11=0000000000000000 r12=0000000000000000 r13=0000000000001000
r14=0000000000000001 r15=fffff8800670b840
iopl=0 nv up ei pl zr na po nc
cs=0010 ss=0018 ds=002b es=002b fs=0053 gs=002b efl=00010246
nt!MmMapLockedPagesSpecifyCache+0x3e:
fffff800`02accdbe 44898424d0000000 mov dword ptr [rsp+0D0h],r8d ss:0018:fffff880`0670b790=????????
Resetting default scope
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT
BUGCHECK_STR: 0x3B
PROCESS_NAME: BFBC2Game.exe
CURRENT_IRQL: 0
LAST_CONTROL_TRANSFER: from 0000000000000000 to fffff80002accdbe
STACK_TEXT:
fffff880`0670b6c0 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!MmMapLockedPagesSpecifyCache+0x3e
FOLLOWUP_IP:
nt!MmMapLockedPagesSpecifyCache+3e
fffff800`02accdbe 44898424d0000000 mov dword ptr [rsp+0D0h],r8d
SYMBOL_STACK_INDEX: 0
SYMBOL_NAME: nt!MmMapLockedPagesSpecifyCache+3e
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: nt
DEBUG_FLR_IMAGE_TIMESTAMP: 4c1c44a9
STACK_COMMAND: .cxr 0xfffff8800670acf0 ; kb
IMAGE_NAME: memory_corruption
FAILURE_BUCKET_ID: X64_0x3B_nt!MmMapLockedPagesSpecifyCache+3e
BUCKET_ID: X64_0x3B_nt!MmMapLockedPagesSpecifyCache+3e
Followup: MachineOwner
---------