Microsoft (R) Windows Debugger Version 6.12.0002.633 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [F:\DMP\033111-16359-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
Symbol search path is: SRV*c:\websymbols*http://msdl.microsoft.com/download/symbols
Executable search path is:
Windows 7 Kernel Version 7600 MP (4 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS
Built by: 7600.16385.amd64fre.win7_rtm.090713-1255
Machine Name:
Kernel base = 0xfffff800`02a06000 PsLoadedModuleList = 0xfffff800`02c43e50
Debug session time: Thu Mar 31 20:34:47.645 2011 (UTC - 4:00)
System Uptime: 0 days 2:25:07.801
Loading Kernel Symbols
...............................................................
................................................................
....................
Loading User Symbols
Loading unloaded module list
.....
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
Use !analyze -v to get detailed debugging information.
BugCheck 1A, {403, fffff6800003a6d0, b63000002ff97867, fffff68000055b82}
Probably caused by : win32k.sys ( win32k!SURFACE::Map+175 )
Followup: MachineOwner
---------
0: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
MEMORY_MANAGEMENT (1a)
# Any other values for parameter 1 must be individually examined.
Arguments:
Arg1: 0000000000000403, The subtype of the bugcheck.
Arg2: fffff6800003a6d0
Arg3: b63000002ff97867
Arg4: fffff68000055b82
Debugging Details:
------------------
BUGCHECK_STR: 0x1a_403
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT
PROCESS_NAME: TeamViewer_Des
CURRENT_IRQL: 0
LAST_CONTROL_TRANSFER: from fffff80002a2d228 to fffff80002a77f00
STACK_TEXT:
fffff880`0e511be8 fffff800`02a2d228 : 00000000`0000001a 00000000`00000403 fffff680`0003a6d0 b6300000`2ff97867 : nt!KeBugCheckEx
fffff880`0e511bf0 fffff800`02aa8b51 : 00000000`00000000 fffff680`0003aff8 fffffa80`04710b30 f0500001`08bbc867 : nt! ?? ::FNODOBFM::`string'+0x31f72
fffff880`0e511da0 fffff800`02aab5d9 : fffff880`00000000 00000000`078eefff fffff900`00000000 00000000`00000068 : nt!MiDeleteVirtualAddresses+0x408
fffff880`0e511f60 fffff800`02d8de50 : fffffa80`03f683c0 0007ffff`00000000 00000000`00000000 00000000`00000000 : nt!MiRemoveMappedView+0xd9
fffff880`0e512080 fffff960`000f3aa5 : 00000000`00000001 fffffa80`05acac80 00000000`00000001 00000cac`00000000 : nt!MiUnmapViewOfSection+0x1b0
fffff880`0e512140 fffff960`0022306e : 00000000`00000000 fffff880`0e512260 fffff880`0e512250 00000000`00000001 : win32k!SURFACE::Map+0x175
fffff880`0e512190 fffff960`001046c8 : fffff900`c0107010 fffff880`0e512250 00000000`00000001 00000438`00000c80 : win32k!DEVLOCKOBJ::bMapTrgSurfaceView+0x3e
fffff880`0e5121c0 fffff960`000c6aeb : fffff900`c20bac30 fffff880`0e512250 00000000`00000001 fffff880`0e512260 : win32k!DEVLOCKOBJ::bPrepareTrgDco+0x98
fffff880`0e5121f0 fffff960`0024947a : fffff900`c0107010 00000000`00000001 fffff880`0e512320 00000000`00000003 : win32k!DEVLOCKOBJ::bLock+0x423
fffff880`0e512230 fffff800`02a77153 : fffffa80`03e2bb60 fffff880`0e512320 00000000`028d0b60 00000000`7efdb000 : win32k!GreSetICMMode+0x86
fffff880`0e5122a0 00000000`747b2dd9 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x13
00000000`0012dcd8 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x747b2dd9
STACK_COMMAND: kb
FOLLOWUP_IP:
win32k!SURFACE::Map+175
fffff960`000f3aa5 8b4574 mov eax,dword ptr [rbp+74h]
SYMBOL_STACK_INDEX: 5
SYMBOL_NAME: win32k!SURFACE::Map+175
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: win32k
IMAGE_NAME: win32k.sys
DEBUG_FLR_IMAGE_TIMESTAMP: 4a5bc5e0
FAILURE_BUCKET_ID: X64_0x1a_403_win32k!SURFACE::Map+175
BUCKET_ID: X64_0x1a_403_win32k!SURFACE::Map+175
Followup: MachineOwner
---------
Microsoft (R) Windows Debugger Version 6.12.0002.633 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [F:\DMP\032611-18937-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
Symbol search path is: SRV*c:\websymbols*http://msdl.microsoft.com/download/symbols
Executable search path is:
Windows 7 Kernel Version 7600 MP (4 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS
Built by: 7600.16385.amd64fre.win7_rtm.090713-1255
Machine Name:
Kernel base = 0xfffff800`0280e000 PsLoadedModuleList = 0xfffff800`02a4be50
Debug session time: Sat Mar 26 14:46:36.941 2011 (UTC - 4:00)
System Uptime: 0 days 0:48:19.144
Loading Kernel Symbols
...............................................................
................................................................
................
Loading User Symbols
Loading unloaded module list
....
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
Use !analyze -v to get detailed debugging information.
BugCheck 1A, {403, fffff6800003d850, dbd000003c0c5867, fffff68000026908}
Probably caused by : win32k.sys ( win32k!SURFACE::bDeleteSurface+3a2 )
Followup: MachineOwner
---------
2: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
MEMORY_MANAGEMENT (1a)
# Any other values for parameter 1 must be individually examined.
Arguments:
Arg1: 0000000000000403, The subtype of the bugcheck.
Arg2: fffff6800003d850
Arg3: dbd000003c0c5867
Arg4: fffff68000026908
Debugging Details:
------------------
BUGCHECK_STR: 0x1a_403
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT
PROCESS_NAME: chrome.exe
CURRENT_IRQL: 0
LAST_CONTROL_TRANSFER: from fffff80002835228 to fffff8000287ff00
STACK_TEXT:
fffff880`0ca20328 fffff800`02835228 : 00000000`0000001a 00000000`00000403 fffff680`0003d850 dbd00000`3c0c5867 : nt!KeBugCheckEx
fffff880`0ca20330 fffff800`028b0b51 : 00000000`00000000 fffff680`0003dbf0 fffffa80`05453060 f1800000`52d39867 : nt! ?? ::FNODOBFM::`string'+0x31f72
fffff880`0ca204e0 fffff800`028b35d9 : fffff900`00000000 00000000`07b7efff fffff880`00000000 00000000`0000003c : nt!MiDeleteVirtualAddresses+0x408
fffff880`0ca206a0 fffff800`02b95e50 : fffffa80`04250530 0007ffff`00000000 00000000`00000000 00000000`00000000 : nt!MiRemoveMappedView+0xd9
fffff880`0ca207c0 fffff800`02b9625b : 00000416`00000000 00000000`076e0000 fffffa80`00000001 fffff960`0026f000 : nt!MiUnmapViewOfSection+0x1b0
fffff880`0ca20880 fffff800`0287f153 : 00000000`00000001 fffff900`c388e280 fffffa80`05453060 00000000`00000000 : nt!NtUnmapViewOfSection+0x5f
fffff880`0ca208d0 fffff800`0287b6f0 : fffff960`001550ca 00000000`00000001 fffff900`c0107010 fffff900`c394ccd0 : nt!KiSystemServiceCopyEnd+0x13
fffff880`0ca20a68 fffff960`001550ca : 00000000`00000001 fffff900`c0107010 fffff900`c394ccd0 00000000`00000000 : nt!KiServiceLinkage
fffff880`0ca20a70 fffff960`0015544c : ffffffff`00000000 fffff880`00000000 fffff900`c394ccd0 00000000`00000000 : win32k!SURFACE::bDeleteSurface+0x3a2
fffff880`0ca20bc0 fffff960`0011661d : ffffffff`b105155d fffff900`c394ccd0 00000000`0000155d 00000000`000de530 : win32k!bDeleteSurface+0x34
fffff880`0ca20bf0 fffff800`0287f153 : fffffa80`04855060 fffff900`c00bf010 00000000`003af258 00000000`00000000 : win32k!NtGdiDeleteObjectApp+0xd5
fffff880`0ca20c20 00000000`73642dd9 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x13
00000000`000de4b8 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x73642dd9
STACK_COMMAND: kb
FOLLOWUP_IP:
win32k!SURFACE::bDeleteSurface+3a2
fffff960`001550ca e9d6010000 jmp win32k!SURFACE::bDeleteSurface+0x57d (fffff960`001552a5)
SYMBOL_STACK_INDEX: 8
SYMBOL_NAME: win32k!SURFACE::bDeleteSurface+3a2
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: win32k
IMAGE_NAME: win32k.sys
DEBUG_FLR_IMAGE_TIMESTAMP: 4a5bc5e0
FAILURE_BUCKET_ID: X64_0x1a_403_win32k!SURFACE::bDeleteSurface+3a2
BUCKET_ID: X64_0x1a_403_win32k!SURFACE::bDeleteSurface+3a2
Followup: MachineOwner
---------
Microsoft (R) Windows Debugger Version 6.12.0002.633 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [F:\DMP\040211-40250-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
Symbol search path is: SRV*c:\websymbols*http://msdl.microsoft.com/download/symbols
Executable search path is:
Windows 7 Kernel Version 7600 MP (4 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS
Built by: 7600.16385.amd64fre.win7_rtm.090713-1255
Machine Name:
Kernel base = 0xfffff800`02a5e000 PsLoadedModuleList = 0xfffff800`02c9be50
Debug session time: Sun Apr 3 00:37:45.399 2011 (UTC - 4:00)
System Uptime: 0 days 12:49:34.586
Loading Kernel Symbols
...............................................................
................................................................
......................
Loading User Symbols
Loading unloaded module list
..............
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
Use !analyze -v to get detailed debugging information.
BugCheck 1A, {403, fffff6800004d598, f780000129af5867, fffff6fc5003b9e8}
Probably caused by : ntkrnlmp.exe ( nt! ?? ::FNODOBFM::`string'+31f72 )
Followup: MachineOwner
---------
0: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
MEMORY_MANAGEMENT (1a)
# Any other values for parameter 1 must be individually examined.
Arguments:
Arg1: 0000000000000403, The subtype of the bugcheck.
Arg2: fffff6800004d598
Arg3: f780000129af5867
Arg4: fffff6fc5003b9e8
Debugging Details:
------------------
BUGCHECK_STR: 0x1a_403
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT
PROCESS_NAME: ManyCam.exe
CURRENT_IRQL: 0
LAST_CONTROL_TRANSFER: from fffff80002a85228 to fffff80002acff00
STACK_TEXT:
fffff880`10438678 fffff800`02a85228 : 00000000`0000001a 00000000`00000403 fffff680`0004d598 f7800001`29af5867 : nt!KeBugCheckEx
fffff880`10438680 fffff800`02b00b51 : 00000000`00000000 fffff680`0004dd18 fffffa80`05e7d550 c6f00000`15b26867 : nt! ?? ::FNODOBFM::`string'+0x31f72
fffff880`10438830 fffff800`02b035d9 : 00000000`00000000 00000000`09ba3fff fffff880`00000000 00000000`00000000 : nt!MiDeleteVirtualAddresses+0x408
fffff880`104389f0 fffff800`02de5e50 : fffffa80`04d27840 0007ffff`00000000 00000000`00000000 00000000`00000000 : nt!MiRemoveMappedView+0xd9
fffff880`10438b10 fffff800`02de625b : 00000000`00000000 00000000`09810000 fffffa80`00000001 fffffa80`055ee701 : nt!MiUnmapViewOfSection+0x1b0
fffff880`10438bd0 fffff800`02acf153 : 00000000`00000001 00000000`00000000 fffffa80`05e7d550 fffffa80`055ee720 : nt!NtUnmapViewOfSection+0x5f
fffff880`10438c20 00000000`76e6015a : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x13
00000000`0802e808 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x76e6015a
STACK_COMMAND: kb
FOLLOWUP_IP:
nt! ?? ::FNODOBFM::`string'+31f72
fffff800`02a85228 cc int 3
SYMBOL_STACK_INDEX: 1
SYMBOL_NAME: nt! ?? ::FNODOBFM::`string'+31f72
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: nt
IMAGE_NAME: ntkrnlmp.exe
DEBUG_FLR_IMAGE_TIMESTAMP: 4a5bc600
FAILURE_BUCKET_ID: X64_0x1a_403_nt!_??_::FNODOBFM::_string_+31f72
BUCKET_ID: X64_0x1a_403_nt!_??_::FNODOBFM::_string_+31f72
Followup: MachineOwner
---------
Microsoft (R) Windows Debugger Version 6.12.0002.633 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [F:\DMP\040511-17312-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
Symbol search path is: SRV*c:\websymbols*http://msdl.microsoft.com/download/symbols
Executable search path is:
Windows 7 Kernel Version 7600 MP (4 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS
Built by: 7600.16385.amd64fre.win7_rtm.090713-1255
Machine Name:
Kernel base = 0xfffff800`02a4e000 PsLoadedModuleList = 0xfffff800`02c8be50
Debug session time: Tue Apr 5 15:55:08.897 2011 (UTC - 4:00)
System Uptime: 0 days 3:28:08.053
Loading Kernel Symbols
...............................................................
................................................................
......................
Loading User Symbols
Loading unloaded module list
....
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
Use !analyze -v to get detailed debugging information.
BugCheck 4E, {99, 123eb9, 2, 123f38}
Probably caused by : memory_corruption ( nt!MiBadShareCount+4c )
Followup: MachineOwner
---------
3: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
PFN_LIST_CORRUPT (4e)
Typically caused by drivers passing bad memory descriptor lists (ie: calling
MmUnlockPages twice with the same list, etc). If a kernel debugger is
available get the stack trace.
Arguments:
Arg1: 0000000000000099, A PTE or PFN is corrupt
Arg2: 0000000000123eb9, page frame number
Arg3: 0000000000000002, current page state
Arg4: 0000000000123f38, 0
Debugging Details:
------------------
BUGCHECK_STR: 0x4E_99
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT
PROCESS_NAME: chrome.exe
CURRENT_IRQL: 2
LAST_CONTROL_TRANSFER: from fffff80002b4e32c to fffff80002abff00
STACK_TEXT:
fffff880`0e6cdf18 fffff800`02b4e32c : 00000000`0000004e 00000000`00000099 00000000`00123eb9 00000000`00000002 : nt!KeBugCheckEx
fffff880`0e6cdf20 fffff800`02a75545 : 00000000`00000000 fffff680`00010338 00000000`00000002 00000000`00000001 : nt!MiBadShareCount+0x4c
fffff880`0e6cdf60 fffff800`02a94493 : fffffa80`047497d0 fffff700`000013dc 0000007f`fffffff8 fffff8a0`010083b0 : nt! ?? ::FNODOBFM::`string'+0x322ac
fffff880`0e6cdff0 fffff800`02a92eee : fffffa80`047497d0 fffffa80`00000000 fffff880`00000704 fffff800`00000000 : nt!MiDeleteAddressesInWorkingSet+0x307
fffff880`0e6ce8a0 fffff800`02da27af : fffff8a0`0a514060 fffff880`0e6cec20 00000000`00000000 fffffa80`0678c280 : nt!MmCleanProcessAddressSpace+0x96
fffff880`0e6ce8f0 fffff800`02d7cb3d : 00000000`c0000005 00000000`00000001 00000000`7efd5000 fffffa80`03d6eb60 : nt!PspExitThread+0x47f
fffff880`0e6ce9c0 fffff800`02a9ca43 : 00000000`00000000 00000000`00000000 fffffa80`0678c280 fffff800`02c38e80 : nt!PsExitSpecialApc+0x1d
fffff880`0e6ce9f0 fffff800`02a9ce80 : 00000000`77011c20 fffff880`0e6cea70 fffff800`02d7d710 00000000`00000001 : nt!KiDeliverApc+0x2eb
fffff880`0e6cea70 fffff800`02abf1f7 : 00000000`00000000 fffff8a0`0a514a00 00000000`00000000 fffff8a0`0a514a00 : nt!KiInitiateUserApc+0x70
fffff880`0e6cebb0 00000000`74852dd9 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceExit+0x9c
00000000`0166ecf8 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x74852dd9
STACK_COMMAND: kb
FOLLOWUP_IP:
nt!MiBadShareCount+4c
fffff800`02b4e32c cc int 3
SYMBOL_STACK_INDEX: 1
SYMBOL_NAME: nt!MiBadShareCount+4c
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: nt
DEBUG_FLR_IMAGE_TIMESTAMP: 4a5bc600
IMAGE_NAME: memory_corruption
FAILURE_BUCKET_ID: X64_0x4E_99_nt!MiBadShareCount+4c
BUCKET_ID: X64_0x4E_99_nt!MiBadShareCount+4c
Followup: MachineOwner
---------