Microsoft (R) Windows Debugger Version 6.12.0002.633 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [F:\a\Minidump\D M P\DMP\012311-17019-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
Symbol search path is: SRV*c:\websymbols*http://msdl.microsoft.com/download/symbols
Executable search path is:
Windows 7 Kernel Version 7600 MP (2 procs) Free x86 compatible
Product: WinNt, suite: TerminalServer SingleUserTS
Built by: 7600.16385.x86fre.win7_rtm.090713-1255
Machine Name:
Kernel base = 0x82a14000 PsLoadedModuleList = 0x82b5c810
Debug session time: Sun Jan 23 05:34:48.692 2011 (UTC - 5:00)
System Uptime: 0 days 0:00:17.378
Loading Kernel Symbols
...............................................................
.............................................................
Loading User Symbols
Loading unloaded module list
....
0: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
PAGE_FAULT_IN_NONPAGED_AREA (50)
Invalid system memory was referenced. This cannot be protected by try-except,
it must be protected by a Probe. Typically the address is just plain bad or it
is pointing at freed memory.
Arguments:
Arg1: ffffff92, memory referenced.
Arg2: 00000001, value 0 = read operation, 1 = write operation.
Arg3: 9055447a, If non-zero, the instruction address which referenced the bad memory
address.
Arg4: 00000000, (reserved)
Debugging Details:
------------------
Could not read faulting driver name
WRITE_ADDRESS: GetPointerFromAddress: unable to read from 82b7c718
Unable to read MiSystemVaType memory at 82b5c160
ffffff92
FAULTING_IP:
dxgkrnl!DxgkCloseAdapter+1a
9055447a f65390 not byte ptr [ebx-70h]
MM_INTERNAL_CODE: 0
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: CODE_CORRUPTION
BUGCHECK_STR: 0x50
PROCESS_NAME: nvvsvc.exe
CURRENT_IRQL: 0
TRAP_FRAME: 8b403c68 -- (.trap 0xffffffff8b403c68)
ErrCode = 00000002
eax=8b403d08 ebx=00000002 ecx=86f89d48 edx=93c2ea4d esi=0012f698 edi=000007d2
eip=9055447a esp=8b403cdc ebp=8b403d18 iopl=0 nv up ei pl nz na po nc
cs=0008 ss=0010 ds=0023 es=0023 fs=0030 gs=0000 efl=00010202
dxgkrnl!DxgkCloseAdapter+0x1a:
9055447a f65390 not byte ptr [ebx-70h] ds:0023:ffffff92=??
Resetting default scope
LAST_CONTROL_TRANSFER: from 82a5a5f8 to 82a998e3
STACK_TEXT:
8b403c50 82a5a5f8 00000001 ffffff92 00000000 nt!MmAccessFault+0x106
8b403c50 9055447a 00000001 ffffff92 00000000 nt!KiTrap0E+0xdc
8b403d18 93c2ea62 0012f69c 00000001 8b403d34 dxgkrnl!DxgkCloseAdapter+0x1a
8b403d28 82a5742a 0012f69c 02010384 77d964f4 win32k!NtGdiDdDDICloseAdapter+0x15
8b403d28 77d964f4 0012f69c 02010384 77d964f4 nt!KiFastCallEntry+0x12a
WARNING: Frame IP not in any known module. Following frames may be wrong.
02010384 00000000 00000000 00000000 00000000 0x77d964f4
STACK_COMMAND: kb
CHKIMG_EXTENSION: !chkimg -lo 50 -d !dxgkrnl
90554478 - dxgkrnl!DxgkCloseAdapter+18
[ 1d:1c ]
1 error : !dxgkrnl (90554478)
MODULE_NAME: memory_corruption
IMAGE_NAME: memory_corruption
FOLLOWUP_NAME: memory_corruption
DEBUG_FLR_IMAGE_TIMESTAMP: 0
MEMORY_CORRUPTOR: ONE_BIT
FAILURE_BUCKET_ID: MEMORY_CORRUPTION_ONE_BIT
BUCKET_ID: MEMORY_CORRUPTION_ONE_BIT
Followup: memory_corruption
---------
Microsoft (R) Windows Debugger Version 6.12.0002.633 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [F:\a\Minidump\D M P\DMP\012211-12324-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
Mini Kernel Dump does not have process information
Symbol search path is: SRV*c:\websymbols*http://msdl.microsoft.com/download/symbols
Executable search path is:
"nt" was not found in the image list.
Debugger will attempt to load "nt" at given base 00000000.
Please provide the full image name, including the extension (i.e. kernel32.dll)
for more reliable results.Base address and size overrides can be given as
.reload <image.ext>=<base>,<size>.
Unable to load image nt, Win32 error 0n2
Unable to add module at 00000000
Debugger can not determine kernel base address
Windows 7 Kernel Version 7600 MP (2 procs) Free x86 compatible
Product: WinNt, suite: TerminalServer SingleUserTS
Built by: 7600.16385.x86fre.win7_rtm.090713-1255
Machine Name:
Kernel base = 0x82a04000 PsLoadedModuleList = 0x82b4c810
Debug session time: Sat Jan 22 13:11:27.410 2011 (UTC - 5:00)
System Uptime: 0 days 0:46:20.080
"nt" was not found in the image list.
Debugger will attempt to load "nt" at given base 00000000.
Please provide the full image name, including the extension (i.e. kernel32.dll)
for more reliable results.Base address and size overrides can be given as
.reload <image.ext>=<base>,<size>.
Unable to load image nt, Win32 error 0n2
Unable to add module at 00000000
Debugger can not determine kernel base address
Loading Kernel Symbols
Loading User Symbols
0: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
ATTEMPTED_WRITE_TO_READONLY_MEMORY (be)
An attempt was made to write to readonly memory. The guilty driver is on the
stack trace (and is typically the current instruction pointer).
When possible, the guilty driver's name (Unicode string) is printed on
the bugcheck screen and saved in KiBugCheckDriver.
Arguments:
Arg1: 8e5483f6, Virtual address for the attempted write.
Arg2: 7be9b121, PTE contents.
Arg3: 82b2abac, (reserved)
Arg4: 0000000a, (reserved)
Debugging Details:
------------------
***** Debugger could not find nt in module list, module list might be corrupt, error 0x80070057.
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT
BUGCHECK_STR: 0xBE
CURRENT_IRQL: 0
LAST_CONTROL_TRANSFER: from 82a4a5f8 to 82a898e3
STACK_TEXT:
WARNING: Frame IP not in any known module. Following frames may be wrong.
82b2ab94 82a4a5f8 00000001 8e5483f6 00000000 0x82a898e3
82b2abac 82e167ac badb0d00 000000d1 82a6f1ef 0x82a4a5f8
82b2ac28 8e5483f6 badb0d00 00000000 00000000 0x82e167ac
82b2ad20 82a6c00d 00000000 0000000e 00000000 0x8e5483f6
82b2ad24 00000000 0000000e 00000000 00000000 0x82a6c00d
STACK_COMMAND: kb
SYMBOL_NAME: ANALYSIS_INCONCLUSIVE
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: Unknown_Module
IMAGE_NAME: Unknown_Image
DEBUG_FLR_IMAGE_TIMESTAMP: 0
BUCKET_ID: CORRUPT_MODULELIST
Followup: MachineOwner
---------