Microsoft (R) Windows Debugger Version 6.12.0002.633 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [F:\a\Minidump\D M P\DMP\031911-17206-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
Symbol search path is: SRV*c:\websymbols*http://msdl.microsoft.com/download/symbols
Executable search path is:
Windows 7 Kernel Version 7600 MP (2 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS
Built by: 7600.16695.amd64fre.win7_gdr.101026-1503
Machine Name:
Kernel base = 0xfffff800`02849000 PsLoadedModuleList = 0xfffff800`02a86e50
Debug session time: Sat Mar 19 04:32:21.669 2011 (UTC - 4:00)
System Uptime: 0 days 11:34:23.510
Loading Kernel Symbols
...............................................................
................................................................
................
Loading User Symbols
Loading unloaded module list
.....
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
Use !analyze -v to get detailed debugging information.
BugCheck 116, {fffffa8006da24e0, fffff88003a073bc, 0, 2}
Unable to load image \SystemRoot\system32\DRIVERS\atikmpag.sys, Win32 error 0n2
*** WARNING: Unable to verify timestamp for atikmpag.sys
*** ERROR: Module load completed but symbols could not be loaded for atikmpag.sys
Probably caused by : atikmpag.sys ( atikmpag+73bc )
Followup: MachineOwner
---------
0: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
VIDEO_TDR_FAILURE (116)
Attempt to reset the display driver and recover from timeout failed.
Arguments:
Arg1: fffffa8006da24e0, Optional pointer to internal TDR recovery context (TDR_RECOVERY_CONTEXT).
Arg2: fffff88003a073bc, The pointer into responsible device driver module (e.g. owner tag).
Arg3: 0000000000000000, Optional error code (NTSTATUS) of the last failed operation.
Arg4: 0000000000000002, Optional internal context dependent data.
Debugging Details:
------------------
FAULTING_IP:
atikmpag+73bc
fffff880`03a073bc 4883ec28 sub rsp,28h
DEFAULT_BUCKET_ID: GRAPHICS_DRIVER_TDR_FAULT
CUSTOMER_CRASH_COUNT: 1
BUGCHECK_STR: 0x116
PROCESS_NAME: System
CURRENT_IRQL: 0
STACK_TEXT:
fffff880`021e29c8 fffff880`048f0000 : 00000000`00000116 fffffa80`06da24e0 fffff880`03a073bc 00000000`00000000 : nt!KeBugCheckEx
fffff880`021e29d0 fffff880`048efd0a : fffff880`03a073bc fffffa80`06da24e0 fffffa80`053a5c00 fffffa80`05396010 : dxgkrnl!TdrBugcheckOnTimeout+0xec
fffff880`021e2a10 fffff880`04996f07 : fffffa80`06da24e0 00000000`00000000 fffffa80`053a5c00 fffffa80`05396010 : dxgkrnl!TdrIsRecoveryRequired+0x1a2
fffff880`021e2a40 fffff880`049c0b75 : 00000000`ffffffff 00000000`0028bda8 00000000`00000000 00000000`00000002 : dxgmms1!VidSchiReportHwHang+0x40b
fffff880`021e2b20 fffff880`049bf2bb : 00000000`00000102 00000000`00000000 00000000`0028bda8 00000000`00000000 : dxgmms1!VidSchiCheckHwProgress+0x71
fffff880`021e2b50 fffff880`049922c6 : ffffffff`ff676980 fffffa80`05396010 00000000`00000000 00000000`00000000 : dxgmms1!VidSchiWaitForSchedulerEvents+0x1fb
fffff880`021e2bf0 fffff880`049bee7a : 00000000`00000000 fffffa80`0659dd50 00000000`00000080 fffffa80`05396010 : dxgmms1!VidSchiScheduleCommandToRun+0x1da
fffff880`021e2d00 fffff800`02b5c7c6 : 00000000`fffffc32 fffffa80`053cc770 fffffa80`039e7040 fffffa80`053cc770 : dxgmms1!VidSchiWorkerThread+0xba
fffff880`021e2d40 fffff800`02897c26 : fffff880`009e7180 fffffa80`053cc770 fffff880`009f1f40 2b306850`35766f70 : nt!PspSystemThreadStartup+0x5a
fffff880`021e2d80 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KxStartSystemThread+0x16
STACK_COMMAND: .bugcheck ; kb
FOLLOWUP_IP:
atikmpag+73bc
fffff880`03a073bc 4883ec28 sub rsp,28h
SYMBOL_NAME: atikmpag+73bc
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: atikmpag
IMAGE_NAME: atikmpag.sys
DEBUG_FLR_IMAGE_TIMESTAMP: 4d409c8d
FAILURE_BUCKET_ID: X64_0x116_IMAGE_atikmpag.sys
BUCKET_ID: X64_0x116_IMAGE_atikmpag.sys
Followup: MachineOwner
---------
Microsoft (R) Windows Debugger Version 6.12.0002.633 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [F:\a\Minidump\D M P\DMP\031811-16036-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
Symbol search path is: SRV*c:\websymbols*http://msdl.microsoft.com/download/symbols
Executable search path is:
Windows 7 Kernel Version 7600 MP (2 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS
Built by: 7600.16695.amd64fre.win7_gdr.101026-1503
Machine Name:
Kernel base = 0xfffff800`0281f000 PsLoadedModuleList = 0xfffff800`02a5ce50
Debug session time: Fri Mar 18 16:12:52.590 2011 (UTC - 4:00)
System Uptime: 0 days 0:15:53.431
Loading Kernel Symbols
...............................................................
................................................................
............
Loading User Symbols
Loading unloaded module list
........
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
Use !analyze -v to get detailed debugging information.
BugCheck 1E, {ffffffffc0000005, fffff800028b4b7f, 0, ffffffffffffffff}
Probably caused by : memory_corruption ( nt!MiReplenishPageSlist+100 )
Followup: MachineOwner
---------
1: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
KMODE_EXCEPTION_NOT_HANDLED (1e)
This is a very common bugcheck. Usually the exception address pinpoints
the driver/function that caused the problem. Always note this address
as well as the link date of the driver/image that contains this address.
Arguments:
Arg1: ffffffffc0000005, The exception code that was not handled
Arg2: fffff800028b4b7f, The address that the exception occurred at
Arg3: 0000000000000000, Parameter 0 of the exception
Arg4: ffffffffffffffff, Parameter 1 of the exception
Debugging Details:
------------------
EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - The instruction at 0x%08lx referenced memory at 0x%08lx. The memory could not be %s.
FAULTING_IP:
nt!MiReplenishPageSlist+100
fffff800`028b4b7f f00fba6b1000 lock bts dword ptr [rbx+10h],0
EXCEPTION_PARAMETER1: 0000000000000000
EXCEPTION_PARAMETER2: ffffffffffffffff
READ_ADDRESS: GetPointerFromAddress: unable to read from fffff80002ac70e0
ffffffffffffffff
ERROR_CODE: (NTSTATUS) 0xc0000005 - The instruction at 0x%08lx referenced memory at 0x%08lx. The memory could not be %s.
BUGCHECK_STR: 0x1E_c0000005
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT
PROCESS_NAME: ACBSP.exe
CURRENT_IRQL: 2
EXCEPTION_RECORD: fffff880080fe708 -- (.exr 0xfffff880080fe708)
ExceptionAddress: fffff800028b4b7f (nt!MiReplenishPageSlist+0x0000000000000100)
ExceptionCode: c0000005 (Access violation)
ExceptionFlags: 00000000
NumberParameters: 2
Parameter[0]: 0000000000000000
Parameter[1]: ffffffffffffffff
Attempt to read from address ffffffffffffffff
TRAP_FRAME: fffff880080fe7b0 -- (.trap 0xfffff880080fe7b0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=fffffa8000000000 rbx=0000000000000000 rcx=fdffffffffffffff
rdx=000000000000004f rsi=0000000000000000 rdi=0000000000000000
rip=fffff800028b4b7f rsp=fffff880080fe940 rbp=fffffa80039006e0
r8=fffff80002ac9400 r9=fffffa8003900000 r10=fffffa8003900700
r11=fffff880080fe998 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei pl nz na po nc
nt!MiReplenishPageSlist+0x100:
fffff800`028b4b7f f00fba6b1000 lock bts dword ptr [rbx+10h],0 ds:6b50:00000000`00000010=????????
Resetting default scope
LAST_CONTROL_TRANSFER: from fffff800028c9a39 to fffff8000288f740
STACK_TEXT:
fffff880`080fdf38 fffff800`028c9a39 : 00000000`0000001e ffffffff`c0000005 fffff800`028b4b7f 00000000`00000000 : nt!KeBugCheckEx
fffff880`080fdf40 fffff800`0288ed82 : fffff880`080fe708 fffef280`00000000 fffff880`080fe7b0 00000000`0000000c : nt!KiDispatchException+0x1b9
fffff880`080fe5d0 fffff800`0288d68a : fffff880`00da06e4 fffffa80`059b34b0 fffffa80`044b76a8 fffff880`00da083a : nt!KiExceptionDispatch+0xc2
fffff880`080fe7b0 fffff800`028b4b7f : ffffffff`ffffffff fffffa80`05e65b30 00000000`00000000 00000000`00000161 : nt!KiGeneralProtectionFault+0x10a
fffff880`080fe940 fffff800`028b50af : fffff800`02ac9400 00000000`0000002c fffffa80`0080b440 fffffa80`0080a840 : nt!MiReplenishPageSlist+0x100
fffff880`080fe9a0 fffff800`028aaa9a : fffff680`00160cd8 00000000`00000002 00000000`00000000 ffffffff`ffffffff : nt!MiRemoveAnyPage+0x24f
fffff880`080feac0 fffff800`0288d82e : 00000000`00000001 00000000`00001543 00000000`00000001 00000000`12566321 : nt!MmAccessFault+0x169a
fffff880`080fec20 00000000`02854ca8 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiPageFault+0x16e
00000000`0580f5c0 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x2854ca8
STACK_COMMAND: kb
FOLLOWUP_IP:
nt!MiReplenishPageSlist+100
fffff800`028b4b7f f00fba6b1000 lock bts dword ptr [rbx+10h],0
SYMBOL_STACK_INDEX: 4
SYMBOL_NAME: nt!MiReplenishPageSlist+100
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: nt
DEBUG_FLR_IMAGE_TIMESTAMP: 4cc791bd
IMAGE_NAME: memory_corruption
FAILURE_BUCKET_ID: X64_0x1E_c0000005_nt!MiReplenishPageSlist+100
BUCKET_ID: X64_0x1E_c0000005_nt!MiReplenishPageSlist+100
Followup: MachineOwner
---------
Microsoft (R) Windows Debugger Version 6.12.0002.633 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [F:\a\Minidump\D M P\DMP\031811-15506-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
Symbol search path is: SRV*c:\websymbols*http://msdl.microsoft.com/download/symbols
Executable search path is:
Windows 7 Kernel Version 7600 MP (2 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS
Built by: 7600.16695.amd64fre.win7_gdr.101026-1503
Machine Name:
Kernel base = 0xfffff800`02851000 PsLoadedModuleList = 0xfffff800`02a8ee50
Debug session time: Fri Mar 18 15:56:05.206 2011 (UTC - 4:00)
System Uptime: 0 days 1:01:34.048
Loading Kernel Symbols
...............................................................
................................................................
............
Loading User Symbols
Loading unloaded module list
.....
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
Use !analyze -v to get detailed debugging information.
BugCheck 116, {fffffa8003b154e0, fffff88003a073bc, 0, 2}
Unable to load image \SystemRoot\system32\DRIVERS\atikmpag.sys, Win32 error 0n2
*** WARNING: Unable to verify timestamp for atikmpag.sys
*** ERROR: Module load completed but symbols could not be loaded for atikmpag.sys
Probably caused by : atikmpag.sys ( atikmpag+73bc )
Followup: MachineOwner
---------
0: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
VIDEO_TDR_FAILURE (116)
Attempt to reset the display driver and recover from timeout failed.
Arguments:
Arg1: fffffa8003b154e0, Optional pointer to internal TDR recovery context (TDR_RECOVERY_CONTEXT).
Arg2: fffff88003a073bc, The pointer into responsible device driver module (e.g. owner tag).
Arg3: 0000000000000000, Optional error code (NTSTATUS) of the last failed operation.
Arg4: 0000000000000002, Optional internal context dependent data.
Debugging Details:
------------------
FAULTING_IP:
atikmpag+73bc
fffff880`03a073bc 4883ec28 sub rsp,28h
DEFAULT_BUCKET_ID: GRAPHICS_DRIVER_TDR_FAULT
CUSTOMER_CRASH_COUNT: 1
BUGCHECK_STR: 0x116
PROCESS_NAME: System
CURRENT_IRQL: 0
STACK_TEXT:
fffff880`01fc69c8 fffff880`03ccd000 : 00000000`00000116 fffffa80`03b154e0 fffff880`03a073bc 00000000`00000000 : nt!KeBugCheckEx
fffff880`01fc69d0 fffff880`03cccd0a : fffff880`03a073bc fffffa80`03b154e0 fffffa80`05311d50 fffffa80`04cd8010 : dxgkrnl!TdrBugcheckOnTimeout+0xec
fffff880`01fc6a10 fffff880`03d73f07 : fffffa80`03b154e0 00000000`00000000 fffffa80`05311d50 fffffa80`04cd8010 : dxgkrnl!TdrIsRecoveryRequired+0x1a2
fffff880`01fc6a40 fffff880`03d9db75 : 00000000`ffffffff 00000000`00039a24 00000000`00000000 00000000`00000002 : dxgmms1!VidSchiReportHwHang+0x40b
fffff880`01fc6b20 fffff880`03d9c2bb : 00000000`00000102 00000000`00000000 00000000`00039a24 00000000`00000000 : dxgmms1!VidSchiCheckHwProgress+0x71
fffff880`01fc6b50 fffff880`03d6f2c6 : ffffffff`ff676980 fffffa80`04cd8010 00000000`00000000 00000000`00000000 : dxgmms1!VidSchiWaitForSchedulerEvents+0x1fb
fffff880`01fc6bf0 fffff880`03d9be7a : 00000000`00000000 fffffa80`053c1790 00000000`00000080 fffffa80`04cd8010 : dxgmms1!VidSchiScheduleCommandToRun+0x1da
fffff880`01fc6d00 fffff800`02b647c6 : 00000000`fffffc32 fffffa80`05316060 fffffa80`03968890 fffffa80`05316060 : dxgmms1!VidSchiWorkerThread+0xba
fffff880`01fc6d40 fffff800`0289fc26 : fffff800`02a3be80 fffffa80`05316060 fffff800`02a49c40 2b306850`35766f70 : nt!PspSystemThreadStartup+0x5a
fffff880`01fc6d80 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KxStartSystemThread+0x16
STACK_COMMAND: .bugcheck ; kb
FOLLOWUP_IP:
atikmpag+73bc
fffff880`03a073bc 4883ec28 sub rsp,28h
SYMBOL_NAME: atikmpag+73bc
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: atikmpag
IMAGE_NAME: atikmpag.sys
DEBUG_FLR_IMAGE_TIMESTAMP: 4d409c8d
FAILURE_BUCKET_ID: X64_0x116_IMAGE_atikmpag.sys
BUCKET_ID: X64_0x116_IMAGE_atikmpag.sys
Followup: MachineOwner
---------
Microsoft (R) Windows Debugger Version 6.12.0002.633 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [F:\a\Minidump\D M P\DMP\031911-28672-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
Symbol search path is: SRV*c:\websymbols*http://msdl.microsoft.com/download/symbols
Executable search path is:
Windows 7 Kernel Version 7601 (Service Pack 1) MP (2 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS
Built by: 7601.17514.amd64fre.win7sp1_rtm.101119-1850
Machine Name:
Kernel base = 0xfffff800`0280d000 PsLoadedModuleList = 0xfffff800`02a52e90
Debug session time: Sat Mar 19 05:52:48.457 2011 (UTC - 4:00)
System Uptime: 0 days 0:06:52.049
Loading Kernel Symbols
...............................................................
................................................................
................
Loading User Symbols
Loading unloaded module list
.....
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
Use !analyze -v to get detailed debugging information.
BugCheck 116, {fffffa8004155010, fffff88003e06f5c, 0, 2}
Unable to load image \SystemRoot\system32\DRIVERS\atikmpag.sys, Win32 error 0n2
*** WARNING: Unable to verify timestamp for atikmpag.sys
*** ERROR: Module load completed but symbols could not be loaded for atikmpag.sys
Probably caused by : atikmpag.sys ( atikmpag+6f5c )
Followup: MachineOwner
---------
0: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
VIDEO_TDR_FAILURE (116)
Attempt to reset the display driver and recover from timeout failed.
Arguments:
Arg1: fffffa8004155010, Optional pointer to internal TDR recovery context (TDR_RECOVERY_CONTEXT).
Arg2: fffff88003e06f5c, The pointer into responsible device driver module (e.g. owner tag).
Arg3: 0000000000000000, Optional error code (NTSTATUS) of the last failed operation.
Arg4: 0000000000000002, Optional internal context dependent data.
Debugging Details:
------------------
FAULTING_IP:
atikmpag+6f5c
fffff880`03e06f5c 4883ec28 sub rsp,28h
DEFAULT_BUCKET_ID: GRAPHICS_DRIVER_TDR_FAULT
CUSTOMER_CRASH_COUNT: 1
BUGCHECK_STR: 0x116
PROCESS_NAME: System
CURRENT_IRQL: 0
STACK_TEXT:
fffff880`021b99c8 fffff880`02cfc000 : 00000000`00000116 fffffa80`04155010 fffff880`03e06f5c 00000000`00000000 : nt!KeBugCheckEx
fffff880`021b99d0 fffff880`02cfbd0a : fffff880`03e06f5c fffffa80`04155010 fffffa80`05583c00 fffffa80`05549410 : dxgkrnl!TdrBugcheckOnTimeout+0xec
fffff880`021b9a10 fffff880`02da2f07 : fffffa80`04155010 00000000`00000000 fffffa80`05583c00 fffffa80`05549410 : dxgkrnl!TdrIsRecoveryRequired+0x1a2
fffff880`021b9a40 fffff880`02dccb75 : 00000000`ffffffff 00000000`00006453 00000000`00000000 00000000`00000002 : dxgmms1!VidSchiReportHwHang+0x40b
fffff880`021b9b20 fffff880`02dcb2bb : 00000000`00000102 00000000`00000000 00000000`00006453 00000000`00000000 : dxgmms1!VidSchiCheckHwProgress+0x71
fffff880`021b9b50 fffff880`02d9e2c6 : ffffffff`ff676980 fffffa80`05549410 00000000`00000000 00000000`00000000 : dxgmms1!VidSchiWaitForSchedulerEvents+0x1fb
fffff880`021b9bf0 fffff880`02dcae7a : 00000000`00000000 fffffa80`055e89d0 00000000`00000080 fffffa80`05549410 : dxgmms1!VidSchiScheduleCommandToRun+0x1da
fffff880`021b9d00 fffff800`02b2acce : 00000000`fffffc32 fffffa80`0553f210 fffffa80`039cd040 fffffa80`0553f210 : dxgmms1!VidSchiWorkerThread+0xba
fffff880`021b9d40 fffff800`0287efe6 : fffff800`029ffe80 fffffa80`0553f210 fffff800`02a0dcc0 6c72506f`6865652b : nt!PspSystemThreadStartup+0x5a
fffff880`021b9d80 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KxStartSystemThread+0x16
STACK_COMMAND: .bugcheck ; kb
FOLLOWUP_IP:
atikmpag+6f5c
fffff880`03e06f5c 4883ec28 sub rsp,28h
SYMBOL_NAME: atikmpag+6f5c
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: atikmpag
IMAGE_NAME: atikmpag.sys
DEBUG_FLR_IMAGE_TIMESTAMP: 4c75c178
FAILURE_BUCKET_ID: X64_0x116_IMAGE_atikmpag.sys
BUCKET_ID: X64_0x116_IMAGE_atikmpag.sys
Followup: MachineOwner
---------