Microsoft (R) Windows Debugger Version 6.12.0002.633 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [F:\a\Minidump\D M P\DMP\012811-21294-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
Symbol search path is: SRV*c:\websymbols*http://msdl.microsoft.com/download/symbols
Executable search path is:
Windows 7 Kernel Version 7600 MP (4 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS
Built by: 7600.20738.amd64fre.win7_ldr.100618-1621
Machine Name:
Kernel base = 0xfffff800`02e17000 PsLoadedModuleList = 0xfffff800`0304beb0
Debug session time: Thu Jan 27 19:01:15.257 2011 (UTC - 5:00)
System Uptime: 0 days 0:09:58.255
Loading Kernel Symbols
...............................................................
................................................................
....................................
Loading User Symbols
Loading unloaded module list
.....
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
Use !analyze -v to get detailed debugging information.
BugCheck 3B, {c0000005, fffff8800482840e, fffff880076a7750, 0}
Probably caused by : dxgmms1.sys ( dxgmms1!VIDMM_DEVICE::RemoveCommitment+1e )
Followup: MachineOwner
---------
3: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
SYSTEM_SERVICE_EXCEPTION (3b)
An exception happened while executing a system service routine.
Arguments:
Arg1: 00000000c0000005, Exception code that caused the bugcheck
Arg2: fffff8800482840e, Address of the instruction which caused the bugcheck
Arg3: fffff880076a7750, Address of the context record for the exception that caused the bugcheck
Arg4: 0000000000000000, zero.
Debugging Details:
------------------
EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - The instruction at 0x%08lx referenced memory at 0x%08lx. The memory could not be %s.
FAULTING_IP:
dxgmms1!VIDMM_DEVICE::RemoveCommitment+1e
fffff880`0482840e 498b7a70 mov rdi,qword ptr [r10+70h]
CONTEXT: fffff880076a7750 -- (.cxr 0xfffff880076a7750)
rax=fffff8a00bfab6a0 rbx=fffffa80060af000 rcx=fffff8a00beff350
rdx=fffffa8003d9fb50 rsi=fffffa8003d9fb00 rdi=0075006c006f0056
rip=fffff8800482840e rsp=fffff880076a8128 rbp=0000000000000000
r8=fffffa8003d9fb00 r9=fffff8a00beff350 r10=0075006c006f0056
r11=005c00320065006d r12=0000000000000000 r13=0000000000000000
r14=fffffa800607e000 r15=fffff880076a84c8
iopl=0 nv up ei ng nz na po nc
cs=0010 ss=0018 ds=002b es=002b fs=0053 gs=002b efl=00010286
dxgmms1!VIDMM_DEVICE::RemoveCommitment+0x1e:
fffff880`0482840e 498b7a70 mov rdi,qword ptr [r10+70h] ds:002b:0075006c`006f00c6=????????????????
Resetting default scope
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT
BUGCHECK_STR: 0x3B
PROCESS_NAME: plugin-contain
CURRENT_IRQL: 0
LAST_CONTROL_TRANSFER: from fffff880048215c0 to fffff8800482840e
STACK_TEXT:
fffff880`076a8128 fffff880`048215c0 : fffffa80`060af000 0075006c`006f0056 00000000`00000000 fffffa80`060757a8 : dxgmms1!VIDMM_DEVICE::RemoveCommitment+0x1e
fffff880`076a8130 fffff880`0481fe13 : 0075006c`006f0056 fffffa80`060af000 fffffa80`03d9fb00 fffffa80`06075ec0 : dxgmms1!VIDMM_GLOBAL::NotifyAllocationEviction+0x38
fffff880`076a8160 fffff880`0481f38f : fffff880`076a84b8 fffffa80`00000000 fffff880`076a8430 fffff880`076a84c8 : dxgmms1!VIDMM_GLOBAL::ProcessDeferredCommand+0x523
fffff880`076a8280 fffff880`04839231 : fffffa80`20646156 fffffa80`072b3060 fffffa80`06068950 fffffa80`06075ec8 : dxgmms1!VidMmiProcessSystemCommand+0x23
fffff880`076a82b0 fffff880`048383bc : fffff880`076a8410 00000000`00000000 fffffa80`06075ec0 00000000`00000001 : dxgmms1!VidSchiSubmitSystemCommand+0x39
fffff880`076a82e0 fffff880`0480a77a : 00000000`00000000 fffffa80`06068950 fffffa80`06075ec0 fffffa80`06075ec0 : dxgmms1!VidSchiSubmitQueueCommand+0x74
fffff880`076a8310 fffff880`0483a927 : fffffa80`0607baf0 fffffa80`0607e000 fffffa80`06075ec0 fffffa80`0674c820 : dxgmms1!VidSchiSubmitQueueCommandDirect+0x1e6
fffff880`076a83a0 fffff880`0481f4b9 : fffffa80`00000001 fffffa80`06075010 fffffa80`060af000 fffff880`076a84b8 : dxgmms1!VidSchiSubmitCommandPacketToQueue+0x15f
fffff880`076a8410 fffff880`0481f8dc : fffff880`076a8550 00000000`00000001 fffff880`076a8550 00000000`00000001 : dxgmms1!VIDMM_GLOBAL::QueueSystemCommandAndWait+0xf9
fffff880`076a8480 fffff880`0481b484 : fffffa80`03d9fb00 00000000`00000001 0075006c`006f0056 fffff880`04c6b183 : dxgmms1!VIDMM_GLOBAL::QueueDeferredCommandAndWait+0x4c
fffff880`076a84f0 fffff880`04801ecc : fffffa80`00000000 fffffa80`00000000 00000000`00000000 00000000`00000000 : dxgmms1!VIDMM_GLOBAL::CloseOneAllocation+0xfc
fffff880`076a85c0 fffff880`05108ccc : 00000000`00000000 fffff8a0`0a1ee000 fffff8a0`0a1ee000 00000000`00000001 : dxgmms1!VidMmCloseAllocation+0x44
fffff880`076a85f0 fffff880`0511b784 : 00000000`00000001 00000000`00000000 00000000`00000000 fffff8a0`00000799 : dxgkrnl!DXGDEVICE::DestroyAllocations+0x248
fffff880`076a86e0 fffff880`05100815 : 00000000`fffffeda fffff8a0`0bdfa0a0 fffff8a0`0a1ee000 fffffa80`0606f000 : dxgkrnl!DXGDEVICE::~DXGDEVICE+0x19c
fffff880`076a8750 fffff880`0513edae : 00000000`00000000 fffffa80`0606f000 fffff8a0`0bdfa0a0 fffff8a0`0bdfa120 : dxgkrnl!DXGADAPTER::DestroyDevice+0x1c9
fffff880`076a8780 fffff880`0513e744 : fffff900`c0696ce0 00000000`00000000 00000000`00000001 fffff900`c0696ce0 : dxgkrnl!DXGPROCESS::Destroy+0xba
fffff880`076a8830 fffff960`00104c44 : 00000000`00001354 fffff900`c0696ce0 00000000`00000000 fffff900`c0696ce0 : dxgkrnl!DxgkProcessCallout+0x268
fffff880`076a88c0 fffff960`00104337 : fffffa80`062acd00 fffff880`076a8c20 00000000`00000000 fffff880`076a8c20 : win32k!GdiProcessCallout+0x244
fffff880`076a8940 fffff800`03162455 : fffffa80`062acda0 00000000`00000000 00000000`00000000 fffffa80`03e2fb60 : win32k!W32pProcessCallout+0x6b
fffff880`076a8970 fffff800`0313b0ed : 00000000`c0000005 00000000`c0000001 fffffa80`78457300 fffffa80`03b4d750 : nt!PspExitThread+0x561
fffff880`076a8a30 fffff800`02e586a3 : 00000000`00000100 fffffa80`03e2fc20 00000000`00000001 fffff800`02e84a5d : nt!PsExitSpecialApc+0x1d
fffff880`076a8a60 fffff800`02e58af0 : 00000000`00000000 fffff880`076a8ae0 fffff800`0313b1fc 00000000`00000001 : nt!KiDeliverApc+0x2eb
fffff880`076a8ae0 fffff800`02e7c877 : fffffa80`03e2fb60 00000000`0000047c 00000000`00000000 fffffa80`04b05800 : nt!KiInitiateUserApc+0x70
fffff880`076a8c20 00000000`74f32dd9 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceExit+0x9c
00000000`044cea28 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x74f32dd9
FOLLOWUP_IP:
dxgmms1!VIDMM_DEVICE::RemoveCommitment+1e
fffff880`0482840e 498b7a70 mov rdi,qword ptr [r10+70h]
SYMBOL_STACK_INDEX: 0
SYMBOL_NAME: dxgmms1!VIDMM_DEVICE::RemoveCommitment+1e
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: dxgmms1
IMAGE_NAME: dxgmms1.sys
DEBUG_FLR_IMAGE_TIMESTAMP: 4ccf7c90
STACK_COMMAND: .cxr 0xfffff880076a7750 ; kb
FAILURE_BUCKET_ID: X64_0x3B_dxgmms1!VIDMM_DEVICE::RemoveCommitment+1e
BUCKET_ID: X64_0x3B_dxgmms1!VIDMM_DEVICE::RemoveCommitment+1e
Followup: MachineOwner
---------
Microsoft (R) Windows Debugger Version 6.12.0002.633 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [F:\a\Minidump\D M P\DMP\012811-22838-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
Symbol search path is: SRV*c:\websymbols*http://msdl.microsoft.com/download/symbols
Executable search path is:
Windows 7 Kernel Version 7600 MP (4 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS
Built by: 7600.20738.amd64fre.win7_ldr.100618-1621
Machine Name:
Kernel base = 0xfffff800`02e13000 PsLoadedModuleList = 0xfffff800`03047eb0
Debug session time: Fri Jan 28 10:30:50.444 2011 (UTC - 5:00)
System Uptime: 0 days 0:00:16.504
Loading Kernel Symbols
...............................................................
......................................................
Loading User Symbols
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
Use !analyze -v to get detailed debugging information.
BugCheck D1, {1, 2, 1, fffff88003e5475f}
Probably caused by : hardware ( tunnel!TunnelTimeoutRoutine+f )
Followup: MachineOwner
---------
0: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
DRIVER_IRQL_NOT_LESS_OR_EQUAL (d1)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high. This is usually
caused by drivers using improper addresses.
If kernel debugger is available get stack backtrace.
Arguments:
Arg1: 0000000000000001, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000001, value 0 = read operation, 1 = write operation
Arg4: fffff88003e5475f, address which referenced memory
Debugging Details:
------------------
WORKER_ROUTINE:
+3935326436396531
00000000`00000001 ?? ???
WORK_ITEM: fffff88003e5475f
CURRENT_IRQL: 2
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT
BUGCHECK_STR: 0xD1
PROCESS_NAME: System
TRAP_FRAME: fffff800043b93b0 -- (.trap 0xfffff800043b93b0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=fffff800043b9401 rbx=0000000000000000 rcx=fffff88003e6bc0d
rdx=0000000000000000 rsi=0000000000000000 rdi=0000000000000000
rip=fffff88003e5475f rsp=fffff800043b9540 rbp=0000000000000001
r8=0000000057d19104 r9=0000000001cbbf00 r10=0000000000000003
r11=0000000000000002 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei ng nz na pe nc
tunnel!TunnelTimeoutRoutine+0xf:
fffff880`03e5475f 017601 add dword ptr [rsi+1],esi ds:00000000`00000001=????????
Resetting default scope
MISALIGNED_IP:
tunnel!TunnelTimeoutRoutine+f
fffff880`03e5475f 017601 add dword ptr [rsi+1],esi
LAST_CONTROL_TRANSFER: from fffff80002e78ae9 to fffff80002e79580
STACK_TEXT:
fffff800`043b9268 fffff800`02e78ae9 : 00000000`0000000a 00000000`00000001 00000000`00000002 00000000`00000001 : nt!KeBugCheckEx
fffff800`043b9270 fffff800`02e77760 : 00000000`00000001 00000000`00000001 0000135b`40000000 fffff800`043b9618 : nt!KiBugCheckDispatch+0x69
fffff800`043b93b0 fffff880`03e5475f : fffff880`03e6bcb8 00000000`00000000 fffffa80`0395d3f0 fffff800`02e8329a : nt!KiPageFault+0x260
fffff800`043b9540 fffff800`02e85836 : fffff800`043b9600 00000000`00000200 00000000`00000000 00000000`00000000 : tunnel!TunnelTimeoutRoutine+0xf
fffff800`043b9570 fffff800`02e84b26 : fffff880`03e6bcb8 00000000`00000421 00000000`00000000 00000000`00000000 : nt!KiProcessTimerDpcTable+0x66
fffff800`043b95e0 fffff800`02e8575e : 00000000`09d66fdf fffff800`043b9c58 00000000`00000421 fffff800`02ff76a8 : nt!KiProcessExpiredTimerList+0xc6
fffff800`043b9c30 fffff800`02e84e97 : fffffa80`039d6cc2 fffff800`00000421 fffffa80`039e6040 00000000`00000021 : nt!KiTimerExpiration+0x1be
fffff800`043b9cd0 fffff800`02e81efa : fffff800`02ff4e80 fffff800`03002cc0 00000000`00000000 fffff880`00e14f44 : nt!KiRetireDpcList+0x277
fffff800`043b9d80 00000000`00000000 : fffff800`043ba000 fffff800`043b4000 fffff800`043b9d40 00000000`00000000 : nt!KiIdleLoop+0x5a
STACK_COMMAND: kb
FOLLOWUP_IP:
tunnel!TunnelTimeoutRoutine+f
fffff880`03e5475f 017601 add dword ptr [rsi+1],esi
SYMBOL_STACK_INDEX: 3
SYMBOL_NAME: tunnel!TunnelTimeoutRoutine+f
FOLLOWUP_NAME: MachineOwner
IMAGE_NAME: hardware
DEBUG_FLR_IMAGE_TIMESTAMP: 0
MODULE_NAME: hardware
FAILURE_BUCKET_ID: X64_IP_MISALIGNED_tunnel.sys
BUCKET_ID: X64_IP_MISALIGNED_tunnel.sys
Followup: MachineOwner
---------