Microsoft (R) Windows Debugger Version 6.12.0002.633 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [F:\a\Minidump\D M P\DMP\012711-16567-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
Symbol search path is: SRV*c:\websymbols*http://msdl.microsoft.com/download/symbols
Executable search path is:
Windows 7 Kernel Version 7600 MP (2 procs) Free x86 compatible
Product: WinNt, suite: TerminalServer SingleUserTS
Built by: 7600.16617.x86fre.win7_gdr.100618-1621
Machine Name:
Kernel base = 0x82a1a000 PsLoadedModuleList = 0x82b62810
Debug session time: Thu Jan 27 05:02:03.694 2011 (UTC - 5:00)
System Uptime: 0 days 0:00:16.364
Loading Kernel Symbols
...............................................................
............................................................
Loading User Symbols
Loading unloaded module list
....
Unable to load image \SystemRoot\System32\drivers\dxgkrnl.sys, Win32 error 0n2
*** WARNING: Unable to verify timestamp for dxgkrnl.sys
*** ERROR: Module load completed but symbols could not be loaded for dxgkrnl.sys
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
Use !analyze -v to get detailed debugging information.
BugCheck 1000007E, {c0000005, 820a134b, 8dddbf8c, 8dddbb70}
Probably caused by : dxgkrnl.sys ( dxgkrnl+2334b )
Followup: MachineOwner
---------
0: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
SYSTEM_THREAD_EXCEPTION_NOT_HANDLED_M (1000007e)
This is a very common bugcheck. Usually the exception address pinpoints
the driver/function that caused the problem. Always note this address
as well as the link date of the driver/image that contains this address.
Some common problems are exception code 0x80000003. This means a hard
coded breakpoint or assertion was hit, but this system was booted
/NODEBUG. This is not supposed to happen as developers should never have
hardcoded breakpoints in retail code, but ...
If this happens, make sure a debugger gets connected, and the
system is booted /DEBUG. This will let us see why this breakpoint is
happening.
Arguments:
Arg1: c0000005, The exception code that was not handled
Arg2: 820a134b, The address that the exception occurred at
Arg3: 8dddbf8c, Exception Record Address
Arg4: 8dddbb70, Context Record Address
Debugging Details:
------------------
EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - The instruction at 0x%08lx referenced memory at 0x%08lx. The memory could not be %s.
FAULTING_IP:
dxgkrnl+2334b
820a134b 89480c mov dword ptr [eax+0Ch],ecx
EXCEPTION_RECORD: 8dddbf8c -- (.exr 0xffffffff8dddbf8c)
ExceptionAddress: 820a134b (dxgkrnl+0x0002334b)
ExceptionCode: c0000005 (Access violation)
ExceptionFlags: 00000000
NumberParameters: 2
Parameter[0]: 00000001
Parameter[1]: 0000000c
Attempt to write to address 0000000c
CONTEXT: 8dddbb70 -- (.cxr 0xffffffff8dddbb70)
eax=00000000 ebx=8d8641b0 ecx=00000000 edx=00800001 esi=8dddc0a4 edi=82e2f6ee
eip=820a134b esp=8dddc054 ebp=8dddc070 iopl=0 nv up ei pl zr na pe nc
cs=0008 ss=0010 ds=0023 es=0023 fs=0030 gs=0000 efl=00010246
dxgkrnl+0x2334b:
820a134b 89480c mov dword ptr [eax+0Ch],ecx ds:0023:0000000c=????????
Resetting default scope
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: csrss.exe
CURRENT_IRQL: 0
ERROR_CODE: (NTSTATUS) 0xc0000005 - The instruction at 0x%08lx referenced memory at 0x%08lx. The memory could not be %s.
EXCEPTION_PARAMETER1: 00000001
EXCEPTION_PARAMETER2: 0000000c
WRITE_ADDRESS: GetPointerFromAddress: unable to read from 82b82718
Unable to read MiSystemVaType memory at 82b62160
0000000c
FOLLOWUP_IP:
dxgkrnl+2334b
820a134b 89480c mov dword ptr [eax+0Ch],ecx
BUGCHECK_STR: 0x7E
DEFAULT_BUCKET_ID: NULL_CLASS_PTR_DEREFERENCE
LAST_CONTROL_TRANSFER: from 8207f097 to 820a134b
STACK_TEXT:
WARNING: Stack unwind information not available. Following frames may be wrong.
8dddc070 8207f097 00000000 8dddc08c 82136123 dxgkrnl+0x2334b
8dddc07c 82136123 86ae1000 8dddc0a4 8dddc178 dxgkrnl+0x1097
8dddc08c 82149f03 8dddc0a4 86af2958 86af2000 dxgmms1!DXGADAPTER::DdiPatch+0x11
8dddc178 8214eed0 86af2224 8dddc2ec 00000001 dxgmms1!VIDMM_GLOBAL::FlushPagingBufferInternal+0x201
8dddc1b0 82150874 00000000 8dddc2ec 86ad9438 dxgmms1!VIDMM_GLOBAL::EndPreparation+0xda
8dddc21c 82150eaa 60000481 8dddc2ec 8dddc318 dxgmms1!VIDMM_GLOBAL::ProcessDeferredCommand+0x7b6
8dddc234 8216636f 8dddc310 86ad9438 86ad9438 dxgmms1!VidMmiProcessSystemCommand+0x20
8dddc250 82167249 86abc200 86adc788 8dddc290 dxgmms1!VidSchiSubmitSystemCommand+0x33
8dddc260 821426dc 86ad9438 86ad9438 86adc2f0 dxgmms1!VidSchiSubmitQueueCommand+0x7b
8dddc290 8216741c 86ae4000 8dddc2b4 86adc2f0 dxgmms1!VidSchiSubmitQueueCommandDirect+0x1ae
8dddc2b8 82162775 01ad9438 86af2000 89b794f8 dxgmms1!VidSchiSubmitCommandPacketToQueue+0x180
8dddc2d0 82150f11 86adc788 82150e8a 8dddc310 dxgmms1!VidSchSubmitSystemCommand+0xab
8dddc2fc 82150f86 8dddc310 89b461e0 86b259e0 dxgmms1!VIDMM_GLOBAL::QueueSystemCommandAndWait+0x41
8dddc334 8215222e 8dddc35c 89b47828 89b47810 dxgmms1!VIDMM_GLOBAL::QueueDeferredCommandAndWait+0x3c
8dddc384 82152e99 89b79898 00b461e0 89b794f8 dxgmms1!VIDMM_GLOBAL::OpenOneAllocation+0x240
8dddc3b0 821362db 89b79898 00000000 00000020 dxgmms1!VIDMM_GLOBAL::OpenAllocation+0x9f
8dddc3d0 82080f80 86af2000 89b79898 898ee1f8 dxgmms1!VidMmOpenAllocation+0x1f
8dddc3f4 820a566a 85a32e50 86af2000 89b79898 dxgkrnl+0x2f80
8dddc440 820a452a 8dddc848 8dddc5f0 8dddc470 dxgkrnl+0x2766a
8dddc7dc 820a8377 8dddc848 00000000 00000000 dxgkrnl+0x2652a
8dddc89c 820e1d37 00000000 00000000 ffb89010 dxgkrnl+0x2a377
8dddca78 96f42611 40000000 00000000 8dddcd28 dxgkrnl+0x63d37
8dddcac0 96f45151 ffb89010 8dddccd0 8dddcd28 cdd!CreateAndEnableDevice+0x171
8dddcd50 82c286d3 ffb89010 a9cf8873 00000000 cdd!PresentWorkerThread+0x81d
8dddcd90 82ada0f9 96f44934 ffb89010 00000000 nt!PspSystemThreadStartup+0x9e
00000000 00000000 00000000 00000000 00000000 nt!KiThreadStartup+0x19
SYMBOL_STACK_INDEX: 0
SYMBOL_NAME: dxgkrnl+2334b
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: dxgkrnl
IMAGE_NAME: dxgkrnl.sys
DEBUG_FLR_IMAGE_TIMESTAMP: 4ac54de1
STACK_COMMAND: .cxr 0xffffffff8dddbb70 ; kb
FAILURE_BUCKET_ID: 0x7E_dxgkrnl+2334b
BUCKET_ID: 0x7E_dxgkrnl+2334b
Followup: MachineOwner
---------