Microsoft (R) Windows Debugger Version 6.12.0002.633 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [F:\DMP\042311-30765-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
Symbol search path is: SRV*c:\websymbols*http://msdl.microsoft.com/download/symbols
Executable search path is:
Windows 7 Kernel Version 7600 MP (6 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS
Built by: 7600.16695.amd64fre.win7_gdr.101026-1503
Machine Name:
Kernel base = 0xfffff800`02a5d000 PsLoadedModuleList = 0xfffff800`02c9ae50
Debug session time: Sat Apr 23 13:39:55.342 2011 (UTC - 4:00)
System Uptime: 0 days 0:04:39.967
Loading Kernel Symbols
...................................................
Loading User Symbols
Cannot read PEB32 from WOW64 TEB32 00080018 - Win32 error 0n30
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
Use !analyze -v to get detailed debugging information.
BugCheck 1A, {403, fffff6800029f8f8, cdd0000099e4a867, ffdff6800029f8f8}
Probably caused by : Unknown_Image ( ANALYSIS_INCONCLUSIVE )
Followup: MachineOwner
---------
0: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
MEMORY_MANAGEMENT (1a)
# Any other values for parameter 1 must be individually examined.
Arguments:
Arg1: 0000000000000403, The subtype of the bugcheck.
Arg2: fffff6800029f8f8
Arg3: cdd0000099e4a867
Arg4: ffdff6800029f8f8
Debugging Details:
------------------
BUGCHECK_STR: 0x1a_403
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT
CURRENT_IRQL: 0
LAST_CONTROL_TRANSFER: from fffff8a003182130 to 00000000776fa834
STACK_TEXT:
00000000`0012dcc0 fffff8a0`03182130 : 00000000`05420000 fa800392`2da80460 02000000`00025c1a 00000000`0008b2b6 : 0x776fa834
00000000`0012dcc8 00000000`05420000 : fa800392`2da80460 02000000`00025c1a 00000000`0008b2b6 00000000`00085860 : 0xfffff8a0`03182130
00000000`0012dcd0 fa800392`2da80460 : 02000000`00025c1a 00000000`0008b2b6 00000000`00085860 fffff8a0`02f27860 : 0x5420000
00000000`0012dcd8 02000000`00025c1a : 00000000`0008b2b6 00000000`00085860 fffff8a0`02f27860 00000000`05420000 : 0xfa800392`2da80460
00000000`0012dce0 00000000`0008b2b6 : 00000000`00085860 fffff8a0`02f27860 00000000`05420000 fa800381`b67004e0 : 0x2000000`00025c1a
00000000`0012dce8 00000000`00085860 : fffff8a0`02f27860 00000000`05420000 fa800381`b67004e0 02000000`000881e5 : 0x8b2b6
00000000`0012dcf0 fffff8a0`02f27860 : 00000000`05420000 fa800381`b67004e0 02000000`000881e5 00000000`00000c68 : 0x85860
00000000`0012dcf8 00000000`05420000 : fa800381`b67004e0 02000000`000881e5 00000000`00000c68 00000000`00000003 : 0xfffff8a0`02f27860
00000000`0012dd00 fa800381`b67004e0 : 02000000`000881e5 00000000`00000c68 00000000`00000003 fffff8a0`02c66fa8 : 0x5420000
00000000`0012dd08 02000000`000881e5 : 00000000`00000c68 00000000`00000003 fffff8a0`02c66fa8 00000000`05460001 : 0xfa800381`b67004e0
00000000`0012dd10 00000000`00000c68 : 00000000`00000003 fffff8a0`02c66fa8 00000000`05460001 fa80058e`1f9004c0 : 0x2000000`000881e5
00000000`0012dd18 00000000`00000003 : fffff8a0`02c66fa8 00000000`05460001 fa80058e`1f9004c0 02000000`0008662a : 0xc68
00000000`0012dd20 fffff8a0`02c66fa8 : 00000000`05460001 fa80058e`1f9004c0 02000000`0008662a 00000000`00086a9d : 0x3
00000000`0012dd28 00000000`05460001 : fa80058e`1f9004c0 02000000`0008662a 00000000`00086a9d 00000000`0008819b : 0xfffff8a0`02c66fa8
00000000`0012dd30 fa80058e`1f9004c0 : 02000000`0008662a 00000000`00086a9d 00000000`0008819b fffff8a0`032d11d0 : 0x5460001
00000000`0012dd38 02000000`0008662a : 00000000`00086a9d 00000000`0008819b fffff8a0`032d11d0 00000000`01420000 : 0xfa80058e`1f9004c0
00000000`0012dd40 00000000`00086a9d : 00000000`0008819b fffff8a0`032d11d0 00000000`01420000 fa800387`8f9004c0 : 0x2000000`0008662a
00000000`0012dd48 00000000`0008819b : fffff8a0`032d11d0 00000000`01420000 fa800387`8f9004c0 02000000`00080dc5 : 0x86a9d
00000000`0012dd50 fffff8a0`032d11d0 : 00000000`01420000 fa800387`8f9004c0 02000000`00080dc5 00000000`0008629d : 0x8819b
00000000`0012dd58 00000000`01420000 : fa800387`8f9004c0 02000000`00080dc5 00000000`0008629d 00000000`0007d49d : 0xfffff8a0`032d11d0
00000000`0012dd60 fa800387`8f9004c0 : 02000000`00080dc5 00000000`0008629d 00000000`0007d49d fffff680`000a106a : 0x1420000
00000000`0012dd68 02000000`00080dc5 : 00000000`0008629d 00000000`0007d49d fffff680`000a106a 00000000`00400000 : 0xfa800387`8f9004c0
00000000`0012dd70 00000000`0008629d : 00000000`0007d49d fffff680`000a106a 00000000`00400000 00000000`00000080 : 0x2000000`00080dc5
00000000`0012dd78 00000000`0007d49d : fffff680`000a106a 00000000`00400000 00000000`00000080 00000000`0007b381 : 0x8629d
00000000`0012dd80 fffff680`000a106a : 00000000`00400000 00000000`00000080 00000000`0007b381 00000000`00085d97 : 0x7d49d
00000000`0012dd88 00000000`00400000 : 00000000`00000080 00000000`0007b381 00000000`00085d97 00000000`00086e6f : 0xfffff680`000a106a
00000000`0012dd90 00000000`00000080 : 00000000`0007b381 00000000`00085d97 00000000`00086e6f fffff8a0`03208188 : 0x400000
00000000`0012dd98 00000000`0007b381 : 00000000`00085d97 00000000`00086e6f fffff8a0`03208188 00000000`05420000 : 0x80
00000000`0012dda0 00000000`00085d97 : 00000000`00086e6f fffff8a0`03208188 00000000`05420000 fa8004ac`7ea80460 : 0x7b381
00000000`0012dda8 00000000`00086e6f : fffff8a0`03208188 00000000`05420000 fa8004ac`7ea80460 02000000`00087c8e : 0x85d97
00000000`0012ddb0 fffff8a0`03208188 : 00000000`05420000 fa8004ac`7ea80460 02000000`00087c8e 00000000`00085e9f : 0x86e6f
00000000`0012ddb8 00000000`05420000 : fa8004ac`7ea80460 02000000`00087c8e 00000000`00085e9f 00000000`0008669f : 0xfffff8a0`03208188
00000000`0012ddc0 fa8004ac`7ea80460 : 02000000`00087c8e 00000000`00085e9f 00000000`0008669f fffff680`00227eca : 0x5420000
00000000`0012ddc8 02000000`00087c8e : 00000000`00085e9f 00000000`0008669f fffff680`00227eca 00000000`00400000 : 0xfa8004ac`7ea80460
00000000`0012ddd0 00000000`00085e9f : 00000000`0008669f fffff680`00227eca 00000000`00400000 00000000`00000080 : 0x2000000`00087c8e
00000000`0012ddd8 00000000`0008669f : fffff680`00227eca 00000000`00400000 00000000`00000080 00000000`0008119b : 0x85e9f
00000000`0012dde0 fffff680`00227eca : 00000000`00400000 00000000`00000080 00000000`0008119b 00000000`00027aa0 : 0x8669f
00000000`0012dde8 00000000`00400000 : 00000000`00000080 00000000`0008119b 00000000`00027aa0 00000000`000872a0 : 0xfffff680`00227eca
00000000`0012ddf0 00000000`00000080 : 00000000`0008119b 00000000`00027aa0 00000000`000872a0 fffff680`00127802 : 0x400000
00000000`0012ddf8 00000000`0008119b : 00000000`00027aa0 00000000`000872a0 fffff680`00127802 00000000`00400000 : 0x80
00000000`0012de00 00000000`00027aa0 : 00000000`000872a0 fffff680`00127802 00000000`00400000 00000000`00000080 : 0x8119b
00000000`0012de08 00000000`000872a0 : fffff680`00127802 00000000`00400000 00000000`00000080 00000000`00079e52 : 0x27aa0
00000000`0012de10 fffff680`00127802 : 00000000`00400000 00000000`00000080 00000000`00079e52 00000000`000860a1 : 0x872a0
00000000`0012de18 00000000`00400000 : 00000000`00000080 00000000`00079e52 00000000`000860a1 00000000`0008cea1 : 0xfffff680`00127802
00000000`0012de20 00000000`00000080 : 00000000`00079e52 00000000`000860a1 00000000`0008cea1 fffff680`0034a182 : 0x400000
00000000`0012de28 00000000`00079e52 : 00000000`000860a1 00000000`0008cea1 fffff680`0034a182 00000000`00400000 : 0x80
00000000`0012de30 00000000`000860a1 : 00000000`0008cea1 fffff680`0034a182 00000000`00400000 00000000`00000080 : 0x79e52
00000000`0012de38 00000000`0008cea1 : fffff680`0034a182 00000000`00400000 00000000`00000080 00000000`000843ba : 0x860a1
00000000`0012de40 fffff680`0034a182 : 00000000`00400000 00000000`00000080 00000000`000843ba 00000000`0005b6b4 : 0x8cea1
00000000`0012de48 00000000`00400000 : 00000000`00000080 00000000`000843ba 00000000`0005b6b4 00000000`00000001 : 0xfffff680`0034a182
00000000`0012de50 00000000`00000080 : 00000000`000843ba 00000000`0005b6b4 00000000`00000001 fffff680`0033b828 : 0x400000
00000000`0012de58 00000000`000843ba : 00000000`0005b6b4 00000000`00000001 fffff680`0033b828 00000000`05560001 : 0x80
00000000`0012de60 00000000`0005b6b4 : 00000000`00000001 fffff680`0033b828 00000000`05560001 00000000`00000080 : 0x843ba
00000000`0012de68 00000000`00000001 : fffff680`0033b828 00000000`05560001 00000000`00000080 00000000`00033b0a : 0x5b6b4
00000000`0012de70 fffff680`0033b828 : 00000000`05560001 00000000`00000080 00000000`00033b0a 00000000`000863a3 : 0x1
00000000`0012de78 00000000`05560001 : 00000000`00000080 00000000`00033b0a 00000000`000863a3 00000000`000749a3 : 0xfffff680`0033b828
00000000`0012de80 00000000`00000080 : 00000000`00033b0a 00000000`000863a3 00000000`000749a3 fffff680`00349792 : 0x5560001
00000000`0012de88 00000000`00033b0a : 00000000`000863a3 00000000`000749a3 fffff680`00349792 00000000`00400000 : 0x80
00000000`0012de90 00000000`000863a3 : 00000000`000749a3 fffff680`00349792 00000000`00400000 00000000`00000080 : 0x33b0a
00000000`0012de98 00000000`000749a3 : fffff680`00349792 00000000`00400000 00000000`00000080 00000000`00011a12 : 0x863a3
00000000`0012dea0 fffff680`00349792 : 00000000`00400000 00000000`00000080 00000000`00011a12 00000000`000850a4 : 0x749a3
00000000`0012dea8 00000000`00400000 : 00000000`00000080 00000000`00011a12 00000000`000850a4 00000000`00087da4 : 0xfffff680`00349792
00000000`0012deb0 00000000`00000080 : 00000000`00011a12 00000000`000850a4 00000000`00087da4 fffff680`00349162 : 0x400000
00000000`0012deb8 00000000`00011a12 : 00000000`000850a4 00000000`00087da4 fffff680`00349162 00000000`00400000 : 0x80
00000000`0012dec0 00000000`000850a4 : 00000000`00087da4 fffff680`00349162 00000000`00400000 00000000`00000080 : 0x11a12
00000000`0012dec8 00000000`00087da4 : fffff680`00349162 00000000`00400000 00000000`00000080 00000000`00011a12 : 0x850a4
00000000`0012ded0 fffff680`00349162 : 00000000`00400000 00000000`00000080 00000000`00011a12 00000000`0005acbc : 0x87da4
00000000`0012ded8 00000000`00400000 : 00000000`00000080 00000000`00011a12 00000000`0005acbc 00000000`00000001 : 0xfffff680`00349162
00000000`0012dee0 00000000`00000080 : 00000000`00011a12 00000000`0005acbc 00000000`00000001 fffff680`0033abc0 : 0x400000
00000000`0012dee8 00000000`00011a12 : 00000000`0005acbc 00000000`00000001 fffff680`0033abc0 00000000`05560001 : 0x80
00000000`0012def0 00000000`0005acbc : 00000000`00000001 fffff680`0033abc0 00000000`05560001 00000000`00000080 : 0x11a12
00000000`0012def8 00000000`00000001 : fffff680`0033abc0 00000000`05560001 00000000`00000080 00000000`000850e0 : 0x5acbc
00000000`0012df00 fffff680`0033abc0 : 00000000`05560001 00000000`00000080 00000000`000850e0 00000000`00085fa6 : 0x1
00000000`0012df08 00000000`05560001 : 00000000`00000080 00000000`000850e0 00000000`00085fa6 00000000`00086ea6 : 0xfffff680`0033abc0
00000000`0012df10 00000000`00000080 : 00000000`000850e0 00000000`00085fa6 00000000`00086ea6 fffff680`0011ea82 : 0x5560001
STACK_COMMAND: kb
SYMBOL_NAME: ANALYSIS_INCONCLUSIVE
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: Unknown_Module
IMAGE_NAME: Unknown_Image
DEBUG_FLR_IMAGE_TIMESTAMP: 0
BUCKET_ID: BAD_STACK
Followup: MachineOwner
---------
Microsoft (R) Windows Debugger Version 6.12.0002.633 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [F:\DMP\042511-38234-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
Symbol search path is: SRV*c:\websymbols*http://msdl.microsoft.com/download/symbols
Executable search path is:
Windows 7 Kernel Version 7600 MP (6 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS
Built by: 7600.16695.amd64fre.win7_gdr.101026-1503
Machine Name:
Kernel base = 0xfffff800`02a12000 PsLoadedModuleList = 0xfffff800`02c4fe50
Debug session time: Mon Apr 25 02:56:56.758 2011 (UTC - 4:00)
System Uptime: 0 days 2:55:10.477
Loading Kernel Symbols
...............................................................
................................................................
.......................................
Loading User Symbols
Loading unloaded module list
............
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
Use !analyze -v to get detailed debugging information.
BugCheck 1A, {403, fffff68000051568, e9c000003dfe2867, ffdff68000051568}
Probably caused by : ntkrnlmp.exe ( nt! ?? ::FNODOBFM::`string'+31ef2 )
Followup: MachineOwner
---------
1: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
MEMORY_MANAGEMENT (1a)
# Any other values for parameter 1 must be individually examined.
Arguments:
Arg1: 0000000000000403, The subtype of the bugcheck.
Arg2: fffff68000051568
Arg3: e9c000003dfe2867
Arg4: ffdff68000051568
Debugging Details:
------------------
BUGCHECK_STR: 0x1a_403
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT
PROCESS_NAME: prime95.exe
CURRENT_IRQL: 0
LAST_CONTROL_TRANSFER: from fffff80002af46c8 to fffff80002a82740
STACK_TEXT:
fffff880`09df77b8 fffff800`02af46c8 : 00000000`0000001a 00000000`00000403 fffff680`00051568 e9c00000`3dfe2867 : nt!KeBugCheckEx
fffff880`09df77c0 fffff800`02ab3381 : 00000000`00000000 fffff680`00051ff8 fffffa80`082f3060 fffff800`02a871fa : nt! ?? ::FNODOBFM::`string'+0x31ef2
fffff880`09df7970 fffff800`02ac40da : 00000000`00000000 00000000`14d20fff fffffa80`00000000 fffffa80`082f3060 : nt!MiDeleteVirtualAddresses+0x408
fffff880`09df7b30 fffff800`02a81993 : ffffffff`ffffffff 00000000`03f1f800 00000000`03f1f7c8 00000000`00008000 : nt!NtFreeVirtualMemory+0x5ca
fffff880`09df7c20 00000000`76fcf89a : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x13
00000000`03f1f738 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x76fcf89a
STACK_COMMAND: kb
FOLLOWUP_IP:
nt! ?? ::FNODOBFM::`string'+31ef2
fffff800`02af46c8 cc int 3
SYMBOL_STACK_INDEX: 1
SYMBOL_NAME: nt! ?? ::FNODOBFM::`string'+31ef2
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: nt
IMAGE_NAME: ntkrnlmp.exe
DEBUG_FLR_IMAGE_TIMESTAMP: 4cc791bd
FAILURE_BUCKET_ID: X64_0x1a_403_nt!_??_::FNODOBFM::_string_+31ef2
BUCKET_ID: X64_0x1a_403_nt!_??_::FNODOBFM::_string_+31ef2
Followup: MachineOwner
---------
Microsoft (R) Windows Debugger Version 6.12.0002.633 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [F:\DMP\042311-34796-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
Symbol search path is: SRV*c:\websymbols*http://msdl.microsoft.com/download/symbols
Executable search path is:
Windows 7 Kernel Version 7600 MP (6 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS
Built by: 7600.16695.amd64fre.win7_gdr.101026-1503
Machine Name:
Kernel base = 0xfffff800`02a19000 PsLoadedModuleList = 0xfffff800`02c56e50
Debug session time: Sat Apr 23 13:45:10.905 2011 (UTC - 4:00)
System Uptime: 0 days 0:04:35.530
Loading Kernel Symbols
...................................................
Loading User Symbols
Loading unloaded module list
...
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
Use !analyze -v to get detailed debugging information.
BugCheck 1E, {ffffffffc0000005, fffff80002a8c905, 0, ffffffffffffffff}
Probably caused by : ntkrnlmp.exe ( nt!ExpInterlockedPopEntrySListFault16+0 )
Followup: MachineOwner
---------
0: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
KMODE_EXCEPTION_NOT_HANDLED (1e)
This is a very common bugcheck. Usually the exception address pinpoints
the driver/function that caused the problem. Always note this address
as well as the link date of the driver/image that contains this address.
Arguments:
Arg1: ffffffffc0000005, The exception code that was not handled
Arg2: fffff80002a8c905, The address that the exception occurred at
Arg3: 0000000000000000, Parameter 0 of the exception
Arg4: ffffffffffffffff, Parameter 1 of the exception
Debugging Details:
------------------
EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - The instruction at 0x%08lx referenced memory at 0x%08lx. The memory could not be %s.
FAULTING_IP:
nt!ExpInterlockedPopEntrySListFault16+0
fffff800`02a8c905 498b08 mov rcx,qword ptr [r8]
EXCEPTION_PARAMETER1: 0000000000000000
EXCEPTION_PARAMETER2: ffffffffffffffff
READ_ADDRESS: GetPointerFromAddress: unable to read from fffff80002cc10e0
ffffffffffffffff
ERROR_CODE: (NTSTATUS) 0xc0000005 - The instruction at 0x%08lx referenced memory at 0x%08lx. The memory could not be %s.
BUGCHECK_STR: 0x1E_c0000005
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT
PROCESS_NAME: System
CURRENT_IRQL: 0
LAST_CONTROL_TRANSFER: from fffff80002a9724a to fffff880042297f2
STACK_TEXT:
fffff800`0408fc98 fffff800`02a9724a : 00000000`00369e99 fffffa80`04660dd8 fffff800`02c11c40 00000000`00000002 : 0xfffff880`042297f2
fffff800`0408fca0 fffff800`02a91ebc : fffff800`02c03e80 fffff800`00000000 00000000`00000000 fffff880`0442fdb0 : nt!PoIdle+0x53a
fffff800`0408fd80 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiIdleLoop+0x2c
STACK_COMMAND: .bugcheck ; kb
FOLLOWUP_IP:
nt!ExpInterlockedPopEntrySListFault16+0
fffff800`02a8c905 498b08 mov rcx,qword ptr [r8]
SYMBOL_NAME: nt!ExpInterlockedPopEntrySListFault16+0
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: nt
IMAGE_NAME: ntkrnlmp.exe
DEBUG_FLR_IMAGE_TIMESTAMP: 4cc791bd
FAILURE_BUCKET_ID: X64_0x1E_c0000005_nt!ExpInterlockedPopEntrySListFault16+0
BUCKET_ID: X64_0x1E_c0000005_nt!ExpInterlockedPopEntrySListFault16+0
Followup: MachineOwner
---------
Microsoft (R) Windows Debugger Version 6.12.0002.633 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [F:\DMP\042311-38671-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
Symbol search path is: SRV*c:\websymbols*http://msdl.microsoft.com/download/symbols
Executable search path is:
Windows 7 Kernel Version 7600 MP (6 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS
Built by: 7600.16695.amd64fre.win7_gdr.101026-1503
Machine Name:
Kernel base = 0xfffff800`02a19000 PsLoadedModuleList = 0xfffff800`02c56e50
Debug session time: Sat Apr 23 15:37:33.464 2011 (UTC - 4:00)
System Uptime: 0 days 1:50:49.183
Loading Kernel Symbols
...............................................................
................................................................
......................................
Loading User Symbols
Loading unloaded module list
............
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
Use !analyze -v to get detailed debugging information.
BugCheck 1000007E, {ffffffffc0000005, fffff88005362cee, fffff880021356a8, fffff88002134f10}
Probably caused by : dxgmms1.sys ( dxgmms1!VIDMM_GLOBAL::ReferenceAllocationForPreparation+22 )
Followup: MachineOwner
---------
3: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
SYSTEM_THREAD_EXCEPTION_NOT_HANDLED_M (1000007e)
This is a very common bugcheck. Usually the exception address pinpoints
the driver/function that caused the problem. Always note this address
as well as the link date of the driver/image that contains this address.
Some common problems are exception code 0x80000003. This means a hard
coded breakpoint or assertion was hit, but this system was booted
/NODEBUG. This is not supposed to happen as developers should never have
hardcoded breakpoints in retail code, but ...
If this happens, make sure a debugger gets connected, and the
system is booted /DEBUG. This will let us see why this breakpoint is
happening.
Arguments:
Arg1: ffffffffc0000005, The exception code that was not handled
Arg2: fffff88005362cee, The address that the exception occurred at
Arg3: fffff880021356a8, Exception Record Address
Arg4: fffff88002134f10, Context Record Address
Debugging Details:
------------------
EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - The instruction at 0x%08lx referenced memory at 0x%08lx. The memory could not be %s.
FAULTING_IP:
dxgmms1!VIDMM_GLOBAL::ReferenceAllocationForPreparation+22
fffff880`05362cee 488b18 mov rbx,qword ptr [rax]
EXCEPTION_RECORD: fffff880021356a8 -- (.exr 0xfffff880021356a8)
ExceptionAddress: fffff88005362cee (dxgmms1!VIDMM_GLOBAL::ReferenceAllocationForPreparation+0x0000000000000022)
ExceptionCode: c0000005 (Access violation)
ExceptionFlags: 00000000
NumberParameters: 2
Parameter[0]: 0000000000000000
Parameter[1]: ffffffffffffffff
Attempt to read from address ffffffffffffffff
CONTEXT: fffff88002134f10 -- (.cxr 0xfffff88002134f10)
rax=5958504b06090003 rbx=0000000000000000 rcx=fffffa80058cf000
rdx=fffffa8005320f70 rsi=fffffa80043114a0 rdi=fffffa80058cf000
rip=fffff88005362cee rsp=fffff880021358e0 rbp=fffffa80055ddde8
r8=fffffa8004a48701 r9=0000000000000000 r10=0000000000000000
r11=00000000000001ff r12=000000000000016b r13=0000000000000001
r14=0000000000000000 r15=0000000000000001
iopl=0 nv up ei ng nz na pe nc
cs=0010 ss=0018 ds=002b es=002b fs=0053 gs=002b efl=00010282
dxgmms1!VIDMM_GLOBAL::ReferenceAllocationForPreparation+0x22:
fffff880`05362cee 488b18 mov rbx,qword ptr [rax] ds:002b:5958504b`06090003=????????????????
Resetting default scope
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT
PROCESS_NAME: System
CURRENT_IRQL: 0
ERROR_CODE: (NTSTATUS) 0xc0000005 - The instruction at 0x%08lx referenced memory at 0x%08lx. The memory could not be %s.
EXCEPTION_PARAMETER1: 0000000000000000
EXCEPTION_PARAMETER2: ffffffffffffffff
READ_ADDRESS: GetPointerFromAddress: unable to read from fffff80002cc10e0
ffffffffffffffff
FOLLOWUP_IP:
dxgmms1!VIDMM_GLOBAL::ReferenceAllocationForPreparation+22
fffff880`05362cee 488b18 mov rbx,qword ptr [rax]
BUGCHECK_STR: 0x7E
LAST_CONTROL_TRANSFER: from fffff8800535fed3 to fffff88005362cee
STACK_TEXT:
fffff880`021358e0 fffff880`0535fed3 : 00000000`00000000 fffffa80`043114a0 00000000`0000016b 00000000`00000000 : dxgmms1!VIDMM_GLOBAL::ReferenceAllocationForPreparation+0x22
fffff880`02135910 fffff880`0537a65d : 00000000`00000000 fffff8a0`095a6b40 fffffa80`00000000 fffffa80`04a48750 : dxgmms1!VIDMM_GLOBAL::PrepareDmaBuffer+0x43f
fffff880`02135ae0 fffff880`0537a398 : fffff880`009ecfc0 fffff880`05379d00 fffffa80`00000000 fffffa80`00000000 : dxgmms1!VidSchiSubmitRenderCommand+0x241
fffff880`02135cd0 fffff880`05379e96 : 00000000`00000000 fffffa80`03699bd0 00000000`00000080 fffffa80`0375d410 : dxgmms1!VidSchiSubmitQueueCommand+0x50
fffff880`02135d00 fffff800`02d2c7c6 : 00000000`06c2dc48 fffffa80`056d6b60 fffffa80`0370a380 fffffa80`056d6b60 : dxgmms1!VidSchiWorkerThread+0xd6
fffff880`02135d40 fffff800`02a67c26 : fffff880`009e8180 fffffa80`056d6b60 fffff880`009f3040 00000000`00000000 : nt!PspSystemThreadStartup+0x5a
fffff880`02135d80 00000000`00000000 : fffff880`02136000 fffff880`02130000 fffff880`02135690 00000000`00000000 : nt!KxStartSystemThread+0x16
SYMBOL_STACK_INDEX: 0
SYMBOL_NAME: dxgmms1!VIDMM_GLOBAL::ReferenceAllocationForPreparation+22
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: dxgmms1
IMAGE_NAME: dxgmms1.sys
DEBUG_FLR_IMAGE_TIMESTAMP: 4d3fa174
STACK_COMMAND: .cxr 0xfffff88002134f10 ; kb
FAILURE_BUCKET_ID: X64_0x7E_dxgmms1!VIDMM_GLOBAL::ReferenceAllocationForPreparation+22
BUCKET_ID: X64_0x7E_dxgmms1!VIDMM_GLOBAL::ReferenceAllocationForPreparation+22
Followup: MachineOwner
---------
Microsoft (R) Windows Debugger Version 6.12.0002.633 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [F:\DMP\042411-34125-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
Symbol search path is: SRV*c:\websymbols*http://msdl.microsoft.com/download/symbols
Executable search path is:
Windows 7 Kernel Version 7600 MP (6 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS
Built by: 7600.16695.amd64fre.win7_gdr.101026-1503
Machine Name:
Kernel base = 0xfffff800`02a55000 PsLoadedModuleList = 0xfffff800`02c92e50
Debug session time: Sat Apr 23 23:30:00.788 2011 (UTC - 4:00)
System Uptime: 0 days 2:26:56.523
Loading Kernel Symbols
...............................................................
................................................................
.....................................
Loading User Symbols
Loading unloaded module list
....
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
Use !analyze -v to get detailed debugging information.
BugCheck 3B, {c0000005, fffff8800435b23b, fffff880094e48f0, 0}
Probably caused by : atikmpag.sys ( atikmpag+a23b )
Followup: MachineOwner
---------
3: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
SYSTEM_SERVICE_EXCEPTION (3b)
An exception happened while executing a system service routine.
Arguments:
Arg1: 00000000c0000005, Exception code that caused the bugcheck
Arg2: fffff8800435b23b, Address of the instruction which caused the bugcheck
Arg3: fffff880094e48f0, Address of the context record for the exception that caused the bugcheck
Arg4: 0000000000000000, zero.
Debugging Details:
------------------
EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - The instruction at 0x%08lx referenced memory at 0x%08lx. The memory could not be %s.
FAULTING_IP:
atikmpag+a23b
fffff880`0435b23b 488b4008 mov rax,qword ptr [rax+8]
CONTEXT: fffff880094e48f0 -- (.cxr 0xfffff880094e48f0)
rax=0000000000000001 rbx=fffff880094e5380 rcx=fffffa80068f9040
rdx=ffffffffffb70fc0 rsi=fffff880094e5430 rdi=fffffa80068f9438
rip=fffff8800435b23b rsp=fffff880094e52c0 rbp=fffffa80068f9040
r8=0000000000000000 r9=0000000000000000 r10=0000000000000000
r11=fffffa80068f9040 r12=fffffa8004b99700 r13=000000000000002a
r14=fffff880094e5388 r15=fffffa800593f000
iopl=0 nv up ei pl nz na pe nc
cs=0010 ss=0018 ds=002b es=002b fs=0053 gs=002b efl=00010202
atikmpag+0xa23b:
fffff880`0435b23b 488b4008 mov rax,qword ptr [rax+8] ds:002b:00000000`00000009=????????????????
Resetting default scope
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT
BUGCHECK_STR: 0x3B
PROCESS_NAME: godfather2.exe
CURRENT_IRQL: 0
LAST_CONTROL_TRANSFER: from 0000000000000000 to fffff8800435b23b
STACK_TEXT:
fffff880`094e52c0 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : atikmpag+0xa23b
FOLLOWUP_IP:
atikmpag+a23b
fffff880`0435b23b 488b4008 mov rax,qword ptr [rax+8]
SYMBOL_STACK_INDEX: 0
SYMBOL_NAME: atikmpag+a23b
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: atikmpag
IMAGE_NAME: atikmpag.sys
DEBUG_FLR_IMAGE_TIMESTAMP: 4d409c8d
STACK_COMMAND: .cxr 0xfffff880094e48f0 ; kb
FAILURE_BUCKET_ID: X64_0x3B_atikmpag+a23b
BUCKET_ID: X64_0x3B_atikmpag+a23b
Followup: MachineOwner
---------