Microsoft (R) Windows Debugger Version 6.12.0002.633 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [F:\DMP\041411-68250-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
Symbol search path is: SRV*c:\websymbols*http://msdl.microsoft.com/download/symbols
Executable search path is:
Windows 7 Kernel Version 7600 MP (2 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS
Built by: 7600.16695.amd64fre.win7_gdr.101026-1503
Machine Name:
Kernel base = 0xfffff800`02a59000 PsLoadedModuleList = 0xfffff800`02c96e50
Debug session time: Thu Apr 14 20:32:13.953 2011 (UTC - 4:00)
System Uptime: 0 days 0:01:22.528
Loading Kernel Symbols
...............................................................
................................................................
.................................
Loading User Symbols
Loading unloaded module list
....
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
Use !analyze -v to get detailed debugging information.
BugCheck 1000007E, {ffffffffc0000005, fffff80002acdfc4, fffff880023b7bf8, fffff880023b7460}
Probably caused by : dxgmms1.sys ( dxgmms1!VidSchiSubmitCommandPacketToQueue+1d8 )
Followup: MachineOwner
---------
0: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
SYSTEM_THREAD_EXCEPTION_NOT_HANDLED_M (1000007e)
This is a very common bugcheck. Usually the exception address pinpoints
the driver/function that caused the problem. Always note this address
as well as the link date of the driver/image that contains this address.
Some common problems are exception code 0x80000003. This means a hard
coded breakpoint or assertion was hit, but this system was booted
/NODEBUG. This is not supposed to happen as developers should never have
hardcoded breakpoints in retail code, but ...
If this happens, make sure a debugger gets connected, and the
system is booted /DEBUG. This will let us see why this breakpoint is
happening.
Arguments:
Arg1: ffffffffc0000005, The exception code that was not handled
Arg2: fffff80002acdfc4, The address that the exception occurred at
Arg3: fffff880023b7bf8, Exception Record Address
Arg4: fffff880023b7460, Context Record Address
Debugging Details:
------------------
EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - The instruction at 0x%08lx referenced memory at 0x%08lx. The memory could not be %s.
FAULTING_IP:
nt!KiDeferredReadyThread+e4
fffff800`02acdfc4 80bd1e04000002 cmp byte ptr [rbp+41Eh],2
EXCEPTION_RECORD: fffff880023b7bf8 -- (.exr 0xfffff880023b7bf8)
ExceptionAddress: fffff80002acdfc4 (nt!KiDeferredReadyThread+0x00000000000000e4)
ExceptionCode: c0000005 (Access violation)
ExceptionFlags: 00000000
NumberParameters: 2
Parameter[0]: ffffffffffffffff
Parameter[1]: 0000000000000000
Attempt to execute non-executable address 0000000000000000
CONTEXT: fffff880023b7460 -- (.cxr 0xfffff880023b7460)
rax=0000000000000061 rbx=0000000000000004 rcx=000000000000000f
rdx=000000000000000f rsi=0000000000000000 rdi=fffffa8005211a10
rip=fffff80002acdfc4 rsp=fffff880023b7e30 rbp=bffffa8003a48840
r8=000000000000000f r9=fffffa8003a919b0 r10=fffff80002a59000
r11=0000000000000000 r12=0000000000000000 r13=0000000003a53940
r14=0000000000000001 r15=fffffa8003a91410
iopl=0 nv up ei pl nz na po nc
cs=0010 ss=0018 ds=002b es=002b fs=0053 gs=002b efl=00010206
nt!KiDeferredReadyThread+0xe4:
fffff800`02acdfc4 80bd1e04000002 cmp byte ptr [rbp+41Eh],2 ss:0018:bffffa80`03a48c5e=??
Resetting default scope
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: NULL_DEREFERENCE
PROCESS_NAME: csrss.exe
CURRENT_IRQL: 2
ERROR_CODE: (NTSTATUS) 0xc0000005 - The instruction at 0x%08lx referenced memory at 0x%08lx. The memory could not be %s.
EXCEPTION_PARAMETER1: ffffffffffffffff
EXCEPTION_PARAMETER2: 0000000000000000
WRITE_ADDRESS: GetPointerFromAddress: unable to read from fffff80002d010e0
0000000000000000
FOLLOWUP_IP:
dxgmms1!VidSchiSubmitCommandPacketToQueue+1d8
fffff880`06fb89a0 4c8d5c2440 lea r11,[rsp+40h]
BUGCHECK_STR: 0x7E
LAST_CONTROL_TRANSFER: from fffff80002acd871 to fffff80002acdfc4
STACK_TEXT:
fffff880`023b7e30 fffff800`02acd871 : fffffa80`03a91978 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiDeferredReadyThread+0xe4
fffff880`023b7eb0 fffff880`06fb89a0 : fffffa80`00000000 fffffa80`00000000 fffffa80`06522e00 fffffa80`05211b18 : nt!KeSetEvent+0x1e1
fffff880`023b7f20 fffff880`06fbb6d9 : 00000000`00000001 fffffa80`06520f38 fffff880`023b8180 00000000`00000000 : dxgmms1!VidSchiSubmitCommandPacketToQueue+0x1d8
fffff880`023b7f90 fffff880`06efa6c8 : fffffa80`063f6000 00000000`00000200 fffff880`023b87f0 00000000`00000000 : dxgmms1!VidSchSubmitCommand+0x3ad
fffff880`023b7ff0 fffff880`06ed0fb2 : fffff8a0`00000001 fffff8a0`000004e0 fffff880`023b8638 fffff880`00000002 : dxgkrnl!DXGCONTEXT::Render+0xadc
fffff880`023b8600 fffff960`006cb264 : 00000000`00000000 00000000`00000000 fffff900`c00c0020 ffffffff`fffe7960 : dxgkrnl!DxgkCddGdiCommand+0x1ea
fffff880`023b8690 fffff960`006c95d5 : fffffa80`03a4d070 fffffa80`03a4d070 00000000`00000000 fffff900`c00c0020 : cdd!CHwCommandBuffer::FlushGdiCommands+0xb4
fffff880`023b8980 fffff960`006c5c6e : ffffffff`fffd74e4 00000000`00000010 00000000`00000001 fffff900`00000000 : cdd!CDDPDEV::FlushGdiOutput+0x81
fffff880`023b89b0 fffff800`02d6c7c6 : 00000000`068e6f69 fffffa80`058fab60 00000000`00000080 fffffa80`06253b30 : cdd!PresentWorkerThread+0x902
fffff880`023b8d40 fffff800`02aa7c26 : fffff800`02c43e80 fffffa80`058fab60 fffffa80`05802060 00000001`0011c4ac : nt!PspSystemThreadStartup+0x5a
fffff880`023b8d80 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KxStartSystemThread+0x16
SYMBOL_STACK_INDEX: 2
SYMBOL_NAME: dxgmms1!VidSchiSubmitCommandPacketToQueue+1d8
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: dxgmms1
IMAGE_NAME: dxgmms1.sys
DEBUG_FLR_IMAGE_TIMESTAMP: 4d3fa174
STACK_COMMAND: .cxr 0xfffff880023b7460 ; kb
FAILURE_BUCKET_ID: X64_0x7E_dxgmms1!VidSchiSubmitCommandPacketToQueue+1d8
BUCKET_ID: X64_0x7E_dxgmms1!VidSchiSubmitCommandPacketToQueue+1d8
Followup: MachineOwner
---------
Loading Dump File [F:\DMP\041611-32791-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
Symbol search path is: SRV*c:\websymbols*http://msdl.microsoft.com/download/symbols
Executable search path is:
Windows 7 Kernel Version 7600 MP (2 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS
Built by: 7600.16695.amd64fre.win7_gdr.101026-1503
Machine Name:
Kernel base = 0xfffff800`02a4f000 PsLoadedModuleList = 0xfffff800`02c8ce50
Debug session time: Sun Apr 17 01:15:09.867 2011 (UTC - 4:00)
System Uptime: 0 days 0:01:06.442
Loading Kernel Symbols
...............................................................
................................................................
.......................................
Loading User Symbols
Loading unloaded module list
....
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
Use !analyze -v to get detailed debugging information.
BugCheck 1E, {0, 0, 0, 0}
Probably caused by : partmgr.sys ( partmgr!PmReadWriteCompletion+81 )
Followup: MachineOwner
---------
1: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
KMODE_EXCEPTION_NOT_HANDLED (1e)
This is a very common bugcheck. Usually the exception address pinpoints
the driver/function that caused the problem. Always note this address
as well as the link date of the driver/image that contains this address.
Arguments:
Arg1: 0000000000000000, The exception code that was not handled
Arg2: 0000000000000000, The address that the exception occurred at
Arg3: 0000000000000000, Parameter 0 of the exception
Arg4: 0000000000000000, Parameter 1 of the exception
Debugging Details:
------------------
EXCEPTION_CODE: (Win32) 0 (0) - The operation completed successfully.
FAULTING_IP:
+3638383833633765
00000000`00000000 ?? ???
EXCEPTION_PARAMETER1: 0000000000000000
EXCEPTION_PARAMETER2: 0000000000000000
ERROR_CODE: (NTSTATUS) 0 - STATUS_WAIT_0
BUGCHECK_STR: 0x1E_0
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT
PROCESS_NAME: AVGIDSAgent.ex
CURRENT_IRQL: 2
EXCEPTION_RECORD: fffff88002f22638 -- (.exr 0xfffff88002f22638)
ExceptionAddress: fffff80002bb24a9 (nt!EtwpTraceIo+0x0000000000000129)
ExceptionCode: c0000005 (Access violation)
ExceptionFlags: 00000000
NumberParameters: 2
Parameter[0]: 0000000000000000
Parameter[1]: ffffffffffffffff
Attempt to read from address ffffffffffffffff
TRAP_FRAME: fffff88002f226e0 -- (.trap 0xfffff88002f226e0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=4000000000000000 rbx=0000000000000000 rcx=0000000001535242
rdx=0000000000060000 rsi=0000000000000000 rdi=0000000000000000
rip=fffff80002bb24a9 rsp=fffff88002f22870 rbp=fffffa80049c4940
r8=fffffa80049be9e0 r9=fffffa80049c4b30 r10=fffffa80048ce620
r11=fffff88002f22908 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei pl nz na po nc
nt!EtwpTraceIo+0x129:
fffff800`02bb24a9 488b4018 mov rax,qword ptr [rax+18h] ds:d5f0:40000000`00000018=????????????????
Resetting default scope
LAST_CONTROL_TRANSFER: from fffff80002ab746e to fffff80002abf710
STACK_TEXT:
fffff880`02f21728 fffff800`02ab746e : 00000000`00000017 fffff880`016401d6 fffff880`02f21ea0 fffff800`02aec668 : nt!KeBugCheck
fffff880`02f21730 fffff800`02ae540d : fffff800`02ccdb7c fffff800`02c07ea4 fffff800`02a4f000 fffff880`02f22638 : nt!KiKernelCalloutExceptionHandler+0xe
fffff880`02f21760 fffff800`02aeca90 : fffff800`02c0ea60 fffff880`02f217d8 fffff880`02f22638 fffff800`02a4f000 : nt!RtlpExecuteHandlerForException+0xd
fffff880`02f21790 fffff800`02af99ef : fffff880`02f22638 fffff880`02f21ea0 fffff880`00000000 00000000`0000010a : nt!RtlDispatchException+0x410
fffff880`02f21e70 fffff800`02abed82 : fffff880`02f22638 fffffa80`049c4940 fffff880`02f226e0 fffffa80`049c4b30 : nt!KiDispatchException+0x16f
fffff880`02f22500 fffff800`02abd68a : 00000000`00000000 fffff880`02f22790 ffffffff`00000020 fffff880`01814903 : nt!KiExceptionDispatch+0xc2
fffff880`02f226e0 fffff800`02bb24a9 : 00000000`00000000 00000000`00002000 fffff880`037dab30 fffff880`0180c386 : nt!KiGeneralProtectionFault+0x10a
fffff880`02f22870 fffff880`00ebefb1 : fffff800`02bb2380 fffffa80`049c4940 fffffa80`049c4b30 00000000`00000000 : nt!EtwpTraceIo+0x129
fffff880`02f22910 fffff800`02ac1d26 : fffffa80`049c4aeb 00000000`00000034 fffffa80`04940b90 fffffa80`049c4940 : partmgr!PmReadWriteCompletion+0x81
fffff880`02f22940 fffff880`00fcf8ee : fffffa80`06273a10 00000000`00000001 fffffa80`05d47000 00000000`00000000 : nt!IopfCompleteRequest+0x3a6
fffff880`02f22a20 fffff800`02ac1d26 : 00000000`00000000 00000000`00000000 00000000`00000000 fffffa80`0520c4f0 : CLASSPNP!TransferPktComplete+0x1ce
fffff880`02f22aa0 fffff880`00f9741a : 00000000`00000000 00000000`00000001 fffffa80`05492b80 00000000`00000000 : nt!IopfCompleteRequest+0x3a6
fffff880`02f22b80 fffff880`00f97242 : fffffa80`05492b80 00000000`00000000 fffff880`02f22cd0 fffff880`068b0c01 : ataport!IdeCompleteScsiIrp+0x62
fffff880`02f22bb0 fffff880`00f91e32 : 00000000`00000002 00000000`00000000 fffffa80`05226000 fffff880`06bafc29 : ataport!IdeCommonCrbCompletion+0x5a
fffff880`02f22be0 fffff880`00f9a7ed : fffffa80`048cd1a0 fffffa80`05492b80 00000000`00000000 00000000`00000000 : ataport!IdeTranslateCompletedRequest+0x236
fffff880`02f22d10 fffff880`00f9a0ec : fffffa80`048cd1a0 00000000`00000000 fffffa80`048cd1a0 00000000`00000000 : ataport!IdeProcessCompletedRequests+0x4d5
fffff880`02f22e40 fffff800`02acabfc : fffff880`009e6180 fffffa80`000010a3 fffffa80`048cd050 fffffa80`048cd118 : ataport!IdePortCompletionDpc+0x1a8
fffff880`02f22f00 fffff800`02ac5865 : 00000000`00000000 fffffa80`06dbfb60 00000000`00000000 fffff880`00f99f44 : nt!KiRetireDpcList+0x1bc
fffff880`02f22fb0 fffff800`02ac567c : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KxRetireDpcList+0x5
fffff880`0a62cbe0 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiDispatchInterruptContinue
STACK_COMMAND: kb
FOLLOWUP_IP:
partmgr!PmReadWriteCompletion+81
fffff880`00ebefb1 488b5c2430 mov rbx,qword ptr [rsp+30h]
SYMBOL_STACK_INDEX: 8
SYMBOL_NAME: partmgr!PmReadWriteCompletion+81
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: partmgr
IMAGE_NAME: partmgr.sys
DEBUG_FLR_IMAGE_TIMESTAMP: 4a5bc11e
FAILURE_BUCKET_ID: X64_0x1E_0_partmgr!PmReadWriteCompletion+81
BUCKET_ID: X64_0x1E_0_partmgr!PmReadWriteCompletion+81
Followup: MachineOwner
---------
Microsoft (R) Windows Debugger Version 6.12.0002.633 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [F:\DMP\041611-39905-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
Symbol search path is: SRV*c:\websymbols*http://msdl.microsoft.com/download/symbols
Executable search path is:
Windows 7 Kernel Version 7600 MP (2 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS
Built by: 7600.16695.amd64fre.win7_gdr.101026-1503
Machine Name:
Kernel base = 0xfffff800`02a63000 PsLoadedModuleList = 0xfffff800`02ca0e50
Debug session time: Sun Apr 17 02:20:08.074 2011 (UTC - 4:00)
System Uptime: 0 days 0:04:39.649
Loading Kernel Symbols
...............................................................
................................................................
.......................................
Loading User Symbols
Loading unloaded module list
.....
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
Use !analyze -v to get detailed debugging information.
BugCheck 3B, {c0000005, fffff80002ad6905, fffff8800be1aaa0, 0}
Probably caused by : ntkrnlmp.exe ( nt!ExpInterlockedPopEntrySListFault16+0 )
Followup: MachineOwner
---------
1: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
SYSTEM_SERVICE_EXCEPTION (3b)
An exception happened while executing a system service routine.
Arguments:
Arg1: 00000000c0000005, Exception code that caused the bugcheck
Arg2: fffff80002ad6905, Address of the instruction which caused the bugcheck
Arg3: fffff8800be1aaa0, Address of the context record for the exception that caused the bugcheck
Arg4: 0000000000000000, zero.
Debugging Details:
------------------
EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - The instruction at 0x%08lx referenced memory at 0x%08lx. The memory could not be %s.
FAULTING_IP:
nt!ExpInterlockedPopEntrySListFault16+0
fffff800`02ad6905 498b08 mov rcx,qword ptr [r8]
CONTEXT: fffff8800be1aaa0 -- (.cxr 0xfffff8800be1aaa0)
rax=00000001613e0017 rbx=0000000000001000 rcx=fffff80002c5bb90
rdx=bffffa8003c23001 rsi=0000000000000001 rdi=0000000000000000
rip=fffff80002ad6905 rsp=fffff8800be1b470 rbp=fffff8800be1b4c0
r8=bffffa8003c23000 r9=0000000063416d4d r10=fffff80002c5bb90
r11=0000000000000000 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000063416d4d
iopl=0 nv up ei ng nz na po nc
cs=0010 ss=0018 ds=002b es=002b fs=0053 gs=002b efl=00010286
nt!ExpInterlockedPopEntrySListFault16:
fffff800`02ad6905 498b08 mov rcx,qword ptr [r8] ds:002b:bffffa80`03c23000=????????????????
Resetting default scope
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT
BUGCHECK_STR: 0x3B
PROCESS_NAME: WerFault.exe
CURRENT_IRQL: 0
LAST_CONTROL_TRANSFER: from 0000000000000000 to fffff80002ad6905
STACK_TEXT:
fffff880`0be1b470 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!ExpInterlockedPopEntrySListFault16
FOLLOWUP_IP:
nt!ExpInterlockedPopEntrySListFault16+0
fffff800`02ad6905 498b08 mov rcx,qword ptr [r8]
SYMBOL_STACK_INDEX: 0
SYMBOL_NAME: nt!ExpInterlockedPopEntrySListFault16+0
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: nt
IMAGE_NAME: ntkrnlmp.exe
DEBUG_FLR_IMAGE_TIMESTAMP: 4cc791bd
STACK_COMMAND: .cxr 0xfffff8800be1aaa0 ; kb
FAILURE_BUCKET_ID: X64_0x3B_nt!ExpInterlockedPopEntrySListFault16+0
BUCKET_ID: X64_0x3B_nt!ExpInterlockedPopEntrySListFault16+0
Followup: MachineOwner
---------