Microsoft (R) Windows Debugger Version 6.12.0002.633 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [F:\a\Minidump\D M P\121910-17113-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
Symbol search path is: SRV*c:\websymbols*http://msdl.microsoft.com/download/symbols
Executable search path is:
Windows 7 Kernel Version 7600 MP (4 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS Personal
Built by: 7600.16617.amd64fre.win7_gdr.100618-1621
Machine Name:
Kernel base = 0xfffff800`02a5d000 PsLoadedModuleList = 0xfffff800`02c9ae50
Debug session time: Sun Dec 19 10:43:06.658 2010 (UTC - 5:00)
System Uptime: 0 days 0:47:07.727
Loading Kernel Symbols
...............................................................
................................................................
...................
Loading User Symbols
Loading unloaded module list
.....
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
Use !analyze -v to get detailed debugging information.
BugCheck 1000007E, {ffffffffc0000005, fffff88004021008, fffff88001fbd698, fffff88001fbcf00}
Probably caused by : dxgmms1.sys ( dxgmms1!VIDMM_GLOBAL::ReferenceAllocationForSubmission+b8 )
Followup: MachineOwner
---------
2: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
SYSTEM_THREAD_EXCEPTION_NOT_HANDLED_M (1000007e)
This is a very common bugcheck. Usually the exception address pinpoints
the driver/function that caused the problem. Always note this address
as well as the link date of the driver/image that contains this address.
Some common problems are exception code 0x80000003. This means a hard
coded breakpoint or assertion was hit, but this system was booted
/NODEBUG. This is not supposed to happen as developers should never have
hardcoded breakpoints in retail code, but ...
If this happens, make sure a debugger gets connected, and the
system is booted /DEBUG. This will let us see why this breakpoint is
happening.
Arguments:
Arg1: ffffffffc0000005, The exception code that was not handled
Arg2: fffff88004021008, The address that the exception occurred at
Arg3: fffff88001fbd698, Exception Record Address
Arg4: fffff88001fbcf00, Context Record Address
Debugging Details:
------------------
EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - <Unable to get error code text>
FAULTING_IP:
dxgmms1!VIDMM_GLOBAL::ReferenceAllocationForSubmission+b8
fffff880`04021008 4c8900 mov qword ptr [rax],r8
EXCEPTION_RECORD: fffff88001fbd698 -- (.exr 0xfffff88001fbd698)
ExceptionAddress: fffff88004021008 (dxgmms1!VIDMM_GLOBAL::ReferenceAllocationForSubmission+0x00000000000000b8)
ExceptionCode: c0000005 (Access violation)
ExceptionFlags: 00000000
NumberParameters: 2
Parameter[0]: 0000000000000000
Parameter[1]: ffffffffffffffff
Attempt to read from address ffffffffffffffff
CONTEXT: fffff88001fbcf00 -- (.cxr 0xfffff88001fbcf00)
rax=002e00740072006f rbx=fffff8a009985440 rcx=fffff8a008343fb8
rdx=0000000000000000 rsi=fffffa8003db4880 rdi=fffffa800574b000
rip=fffff88004021008 rsp=fffff88001fbd8d0 rbp=0000000000000000
r8=fffffa8003db48d0 r9=0000000000000001 r10=0000000000000000
r11=fffffa800574c3c0 r12=00000000000000cb r13=0000000000000000
r14=fffffa800652b290 r15=0000000000000735
iopl=0 nv up ei pl zr na po nc
cs=0010 ss=0018 ds=002b es=002b fs=0053 gs=002b efl=00010246
dxgmms1!VIDMM_GLOBAL::ReferenceAllocationForSubmission+0xb8:
fffff880`04021008 4c8900 mov qword ptr [rax],r8 ds:002b:002e0074`0072006f=????????????????
Resetting default scope
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT
PROCESS_NAME: System
CURRENT_IRQL: 0
ERROR_CODE: (NTSTATUS) 0xc0000005 - <Unable to get error code text>
EXCEPTION_PARAMETER1: 0000000000000000
EXCEPTION_PARAMETER2: ffffffffffffffff
READ_ADDRESS: GetPointerFromAddress: unable to read from fffff80002d050e0
ffffffffffffffff
FOLLOWUP_IP:
dxgmms1!VIDMM_GLOBAL::ReferenceAllocationForSubmission+b8
fffff880`04021008 4c8900 mov qword ptr [rax],r8
BUGCHECK_STR: 0x7E
LAST_CONTROL_TRANSFER: from fffff8800401e8af to fffff88004021008
STACK_TEXT:
fffff880`01fbd8d0 fffff880`0401e8af : 00000000`00000000 fffffa80`041ea658 00000000`0000010a fffffa80`03e5f310 : dxgmms1!VIDMM_GLOBAL::ReferenceAllocationForSubmission+0xb8
fffff880`01fbd910 fffff880`0403865d : 00000000`00000000 fffff8a0`07fb34e0 fffffa80`00000000 fffffa80`0652b290 : dxgmms1!VIDMM_GLOBAL::PrepareDmaBuffer+0xe1b
fffff880`01fbdae0 fffff880`04038398 : fffff800`00b96080 fffff880`04037d00 fffffa80`00000000 fffffa80`00000000 : dxgmms1!VidSchiSubmitRenderCommand+0x241
fffff880`01fbdcd0 fffff880`04037e96 : 00000000`00000000 fffffa80`06d9a430 00000000`00000080 fffffa80`05716010 : dxgmms1!VidSchiSubmitQueueCommand+0x50
fffff880`01fbdd00 fffff800`02d71c06 : 00000000`02ab2544 fffffa80`0571ca10 fffffa80`039d0740 fffffa80`0571ca10 : dxgmms1!VidSchiWorkerThread+0xd6
fffff880`01fbdd40 fffff800`02aabc26 : fffff800`02c47e80 fffffa80`0571ca10 fffff800`02c55c40 00000000`00000000 : nt!PspSystemThreadStartup+0x5a
fffff880`01fbdd80 00000000`00000000 : fffff880`01fbe000 fffff880`01fb8000 fffff880`01fbd690 00000000`00000000 : nt!KxStartSystemThread+0x16
SYMBOL_STACK_INDEX: 0
SYMBOL_NAME: dxgmms1!VIDMM_GLOBAL::ReferenceAllocationForSubmission+b8
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: dxgmms1
IMAGE_NAME: dxgmms1.sys
DEBUG_FLR_IMAGE_TIMESTAMP: 4a5bc578
STACK_COMMAND: .cxr 0xfffff88001fbcf00 ; kb
FAILURE_BUCKET_ID: X64_0x7E_dxgmms1!VIDMM_GLOBAL::ReferenceAllocationForSubmission+b8
BUCKET_ID: X64_0x7E_dxgmms1!VIDMM_GLOBAL::ReferenceAllocationForSubmission+b8
Followup: MachineOwner
---------
Microsoft (R) Windows Debugger Version 6.12.0002.633 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [F:\a\Minidump\D M P\121810-17082-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
Symbol search path is: SRV*c:\websymbols*http://msdl.microsoft.com/download/symbols
Executable search path is:
Windows 7 Kernel Version 7600 MP (4 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS Personal
Built by: 7600.16617.amd64fre.win7_gdr.100618-1621
Machine Name:
Kernel base = 0xfffff800`02a11000 PsLoadedModuleList = 0xfffff800`02c4ee50
Debug session time: Sat Dec 18 16:28:50.871 2010 (UTC - 5:00)
System Uptime: 0 days 3:41:31.572
Loading Kernel Symbols
...............................................................
................................................................
...................
Loading User Symbols
Loading unloaded module list
.........
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
Use !analyze -v to get detailed debugging information.
BugCheck 7F, {8, 80050031, 6f8, fffff80002a80ccf}
Probably caused by : ntkrnlmp.exe ( nt!KiDoubleFaultAbort+b2 )
Followup: MachineOwner
---------
2: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
UNEXPECTED_KERNEL_MODE_TRAP (7f)
This means a trap occurred in kernel mode, and it's a trap of a kind
that the kernel isn't allowed to have/catch (bound trap) or that
is always instant death (double fault). The first number in the
bugcheck params is the number of the trap (8 = double fault, etc)
Consult an Intel x86 family manual to learn more about what these
traps are. Here is a *portion* of those codes:
If kv shows a taskGate
use .tss on the part before the colon, then kv.
Else if kv shows a trapframe
use .trap on that value
Else
.trap on the appropriate frame will show where the trap was taken
(on x86, this will be the ebp that goes with the procedure KiTrap)
Endif
kb will then show the corrected stack.
Arguments:
Arg1: 0000000000000008, EXCEPTION_DOUBLE_FAULT
Arg2: 0000000080050031
Arg3: 00000000000006f8
Arg4: fffff80002a80ccf
Debugging Details:
------------------
BUGCHECK_STR: 0x7f_8
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT
PROCESS_NAME: OFDR.exe
CURRENT_IRQL: 1
EXCEPTION_RECORD: fffff88008529ab8 -- (.exr 0xfffff88008529ab8)
ExceptionAddress: fffff80002abb627 (nt!KeContextFromKframes+0x00000000000001b3)
ExceptionCode: 10000002
ExceptionFlags: 00000000
NumberParameters: 0
TRAP_FRAME: fffff88008529b60 -- (.trap 0xfffff88008529b60)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000100008 rbx=0000000000000000 rcx=0000000000100008
rdx=fffff8800852a3c0 rsi=0000000000000000 rdi=0000000000000000
rip=fffff80002abb627 rsp=fffff88008529cf0 rbp=0000000000000001
r8=fffff88008529d60 r9=0000000000010040 r10=000000000010001f
r11=fffff88008529d60 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei pl zr na po nc
nt!KeContextFromKframes+0x1b3:
fffff800`02abb627 f30f7f83a0010000 movdqu xmmword ptr [rbx+1A0h],xmm0 ds:00000000`000001a0=????????????????????????????????
Resetting default scope
LAST_CONTROL_TRANSFER: from fffff80002a80ca9 to fffff80002a81740
STACK_TEXT:
fffff880`02d69ce8 fffff800`02a80ca9 : 00000000`0000007f 00000000`00000008 00000000`80050031 00000000`000006f8 : nt!KeBugCheckEx
fffff880`02d69cf0 fffff800`02a7f172 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiBugCheckDispatch+0x69
fffff880`02d69e30 fffff800`02a80ccf : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiDoubleFaultAbort+0xb2
fffff880`08528f40 fffff800`02a7eedf : fffff880`08529120 00000000`00000001 00000000`00000000 00000000`00000000 : nt!KiExceptionDispatch+0xf
fffff880`08529120 fffff800`02abb627 : 00000000`00000000 fffff800`02aba4a5 00000000`00000000 00000000`00000000 : nt!KiInvalidOpcodeFault+0x11f
fffff880`085292b0 fffff800`02abb985 : fffff880`08529ab8 fffff880`08529820 fffff880`08529b60 fffff880`0852a5a0 : nt!KeContextFromKframes+0x1b3
fffff880`085292f0 fffff800`02a80d82 : fffff880`08529ab8 fffff880`08529d60 fffff880`08529b60 00000000`0010001f : nt!KiDispatchException+0x105
fffff880`08529980 fffff800`02a7eedf : fffff880`08529b60 00000000`00000001 00000000`00000000 00000000`00000000 : nt!KiExceptionDispatch+0xc2
fffff880`08529b60 fffff800`02abb627 : 00000000`00000000 fffff800`02aba4a5 00000000`00000000 00000000`00000000 : nt!KiInvalidOpcodeFault+0x11f
fffff880`08529cf0 fffff800`02abb985 : fffff880`0852a4f8 fffff880`0852a260 fffff880`0852a5a0 fffff880`0852afe0 : nt!KeContextFromKframes+0x1b3
fffff880`08529d30 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiDispatchException+0x105
STACK_COMMAND: kb
FOLLOWUP_IP:
nt!KiDoubleFaultAbort+b2
fffff800`02a7f172 90 nop
SYMBOL_STACK_INDEX: 2
SYMBOL_NAME: nt!KiDoubleFaultAbort+b2
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: nt
IMAGE_NAME: ntkrnlmp.exe
DEBUG_FLR_IMAGE_TIMESTAMP: 4c1c44a9
FAILURE_BUCKET_ID: X64_0x7f_8_nt!KiDoubleFaultAbort+b2
BUCKET_ID: X64_0x7f_8_nt!KiDoubleFaultAbort+b2
Followup: MachineOwner
---------
Microsoft (R) Windows Debugger Version 6.12.0002.633 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [F:\a\Minidump\D M P\121810-22386-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
Symbol search path is: SRV*c:\websymbols*http://msdl.microsoft.com/download/symbols
Executable search path is:
Windows 7 Kernel Version 7600 MP (4 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS Personal
Built by: 7600.16617.amd64fre.win7_gdr.100618-1621
Machine Name:
Kernel base = 0xfffff800`02a53000 PsLoadedModuleList = 0xfffff800`02c90e50
Debug session time: Sat Dec 18 12:46:13.290 2010 (UTC - 5:00)
System Uptime: 2 days 8:25:42.854
Loading Kernel Symbols
...............................................................
................................................................
...................
Loading User Symbols
Loading unloaded module list
..................
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
Use !analyze -v to get detailed debugging information.
BugCheck 50, {fffff80004a3a0c7, 1, fffff88004a3a0e4, 2}
Unable to load image \SystemRoot\system32\DRIVERS\atikmdag.sys, Win32 error 0n2
*** WARNING: Unable to verify timestamp for atikmdag.sys
*** ERROR: Module load completed but symbols could not be loaded for atikmdag.sys
Could not read faulting driver name
Probably caused by : atikmdag.sys ( atikmdag+4280e4 )
Followup: MachineOwner
---------
2: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
PAGE_FAULT_IN_NONPAGED_AREA (50)
Invalid system memory was referenced. This cannot be protected by try-except,
it must be protected by a Probe. Typically the address is just plain bad or it
is pointing at freed memory.
Arguments:
Arg1: fffff80004a3a0c7, memory referenced.
Arg2: 0000000000000001, value 0 = read operation, 1 = write operation.
Arg3: fffff88004a3a0e4, If non-zero, the instruction address which referenced the bad memory
address.
Arg4: 0000000000000002, (reserved)
Debugging Details:
------------------
Could not read faulting driver name
WRITE_ADDRESS: GetPointerFromAddress: unable to read from fffff80002cfb0e0
fffff80004a3a0c7
FAULTING_IP:
atikmdag+4280e4
fffff880`04a3a0e4 41c7000f65c190 mov dword ptr [r8],90C1650Fh
MM_INTERNAL_CODE: 2
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT
BUGCHECK_STR: 0x50
PROCESS_NAME: System
CURRENT_IRQL: 0
TRAP_FRAME: fffff8800514aa90 -- (.trap 0xfffff8800514aa90)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=00000000b328bb40 rbx=0000000000000000 rcx=0000000000000018
rdx=0000000000000138 rsi=0000000000000000 rdi=0000000000000000
rip=fffff88004a3a0e4 rsp=fffff8800514ac28 rbp=0000000000000400
r8=fffff80004a3a0c7 r9=fffff8800514ac70 r10=0002043bb328ba08
r11=000000000000013f r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up di pl nz ac pe nc
atikmdag+0x4280e4:
fffff880`04a3a0e4 41c7000f65c190 mov dword ptr [r8],90C1650Fh ds:aca8:fffff800`04a3a0c7=????????
Resetting default scope
LAST_CONTROL_TRANSFER: from fffff80002b428f2 to fffff80002ac3740
STACK_TEXT:
fffff880`0514a928 fffff800`02b428f2 : 00000000`00000050 fffff800`04a3a0c7 00000000`00000001 fffff880`0514aa90 : nt!KeBugCheckEx
fffff880`0514a930 fffff800`02ac182e : 00000000`00000001 00000000`00000004 9e2f85f7`1a7ffb00 409cc51d`d3614ae9 : nt! ?? ::FNODOBFM::`string'+0x40ec0
fffff880`0514aa90 fffff880`04a3a0e4 : fffff880`048931a0 00000000`00000004 cccccccc`00000000 00000000`00000000 : nt!KiPageFault+0x16e
fffff880`0514ac28 fffff880`048931a0 : 00000000`00000004 cccccccc`00000000 00000000`00000000 00000000`00000000 : atikmdag+0x4280e4
fffff880`0514ac30 00000000`00000004 : cccccccc`00000000 00000000`00000000 00000000`00000000 fffff880`009e9180 : atikmdag+0x2811a0
fffff880`0514ac38 cccccccc`00000000 : 00000000`00000000 00000000`00000000 fffff880`009e9180 0000000a`a0b817c0 : 0x4
fffff880`0514ac40 00000000`00000000 : 00000000`00000000 fffff880`009e9180 0000000a`a0b817c0 00000004`0000017e : 0xcccccccc`00000000
STACK_COMMAND: kb
FOLLOWUP_IP:
atikmdag+4280e4
fffff880`04a3a0e4 41c7000f65c190 mov dword ptr [r8],90C1650Fh
SYMBOL_STACK_INDEX: 3
SYMBOL_NAME: atikmdag+4280e4
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: atikmdag
IMAGE_NAME: atikmdag.sys
DEBUG_FLR_IMAGE_TIMESTAMP: 4ca29946
FAILURE_BUCKET_ID: X64_0x50_atikmdag+4280e4
BUCKET_ID: X64_0x50_atikmdag+4280e4
Followup: MachineOwner
---------
Microsoft (R) Windows Debugger Version 6.12.0002.633 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [F:\a\Minidump\D M P\121910-15194-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
Symbol search path is: SRV*c:\websymbols*http://msdl.microsoft.com/download/symbols
Executable search path is:
Windows 7 Kernel Version 7600 MP (4 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS Personal
Built by: 7600.16617.amd64fre.win7_gdr.100618-1621
Machine Name:
Kernel base = 0xfffff800`02a0b000 PsLoadedModuleList = 0xfffff800`02c48e50
Debug session time: Sat Dec 18 16:30:24.681 2010 (UTC - 5:00)
System Uptime: 0 days 0:00:26.992
Loading Kernel Symbols
...............................................................
................................................................
.........
Loading User Symbols
Loading unloaded module list
....
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
Use !analyze -v to get detailed debugging information.
BugCheck FC, {fffff880026557d0, 8000000116cb0963, fffff88002655480, 2}
Probably caused by : ntkrnlmp.exe ( nt! ?? ::FNODOBFM::`string'+42497 )
Followup: MachineOwner
---------
1: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
ATTEMPTED_EXECUTE_OF_NOEXECUTE_MEMORY (fc)
An attempt was made to execute non-executable memory. The guilty driver
is on the stack trace (and is typically the current instruction pointer).
When possible, the guilty driver's name (Unicode string) is printed on
the bugcheck screen and saved in KiBugCheckDriver.
Arguments:
Arg1: fffff880026557d0, Virtual address for the attempted execute.
Arg2: 8000000116cb0963, PTE contents.
Arg3: fffff88002655480, (reserved)
Arg4: 0000000000000002, (reserved)
Debugging Details:
------------------
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT
BUGCHECK_STR: 0xFC
PROCESS_NAME: csrss.exe
CURRENT_IRQL: 0
TRAP_FRAME: fffff88002655480 -- (.trap 0xfffff88002655480)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000000 rbx=0000000000000000 rcx=00000000018f682c
rdx=0000000000012c68 rsi=0000000000000000 rdi=0000000000000000
rip=fffff880026557d0 rsp=fffff88002655618 rbp=fffff900c01ec240
r8=00000000018f2c68 r9=0000000000000002 r10=fffff900c01ea1b8
r11=fffff880026555f8 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei ng nz na po nc
fffff880`026557d0 98 cwde
Resetting default scope
LAST_CONTROL_TRANSFER: from fffff80002afbbcf to fffff80002a7b740
STACK_TEXT:
fffff880`02655318 fffff800`02afbbcf : 00000000`000000fc fffff880`026557d0 80000001`16cb0963 fffff880`02655480 : nt!KeBugCheckEx
fffff880`02655320 fffff800`02a7982e : 00000000`00000008 fffff880`02655630 fffffa80`00000000 00000000`00000000 : nt! ?? ::FNODOBFM::`string'+0x42497
fffff880`02655480 fffff880`026557d0 : fffff900`c01ea304 fffff880`02655630 fffff880`02655698 00000000`00000006 : nt!KiPageFault+0x16e
fffff880`02655618 fffff900`c01ea304 : fffff880`02655630 fffff880`02655698 00000000`00000006 00000000`00000000 : 0xfffff880`026557d0
fffff880`02655620 fffff880`02655630 : fffff880`02655698 00000000`00000006 00000000`00000000 fffff900`c01ea1b8 : 0xfffff900`c01ea304
fffff880`02655628 fffff880`02655698 : 00000000`00000006 00000000`00000000 fffff900`c01ea1b8 fffff900`c01ea580 : 0xfffff880`02655630
fffff880`02655630 00000000`00000006 : 00000000`00000000 fffff900`c01ea1b8 fffff900`c01ea580 00000000`00000000 : 0xfffff880`02655698
fffff880`02655638 00000000`00000000 : fffff900`c01ea1b8 fffff900`c01ea580 00000000`00000000 fffff960`000bf417 : 0x6
STACK_COMMAND: kb
FOLLOWUP_IP:
nt! ?? ::FNODOBFM::`string'+42497
fffff800`02afbbcf cc int 3
SYMBOL_STACK_INDEX: 1
SYMBOL_NAME: nt! ?? ::FNODOBFM::`string'+42497
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: nt
IMAGE_NAME: ntkrnlmp.exe
DEBUG_FLR_IMAGE_TIMESTAMP: 4c1c44a9
FAILURE_BUCKET_ID: X64_0xFC_nt!_??_::FNODOBFM::_string_+42497
BUCKET_ID: X64_0xFC_nt!_??_::FNODOBFM::_string_+42497
Followup: MachineOwner
---------
Microsoft (R) Windows Debugger Version 6.12.0002.633 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [F:\a\Minidump\D M P\122010-21730-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
Symbol search path is: SRV*c:\websymbols*http://msdl.microsoft.com/download/symbols
Executable search path is:
Windows 7 Kernel Version 7600 MP (4 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS Personal
Built by: 7600.16617.amd64fre.win7_gdr.100618-1621
Machine Name:
Kernel base = 0xfffff800`02a03000 PsLoadedModuleList = 0xfffff800`02c40e50
Debug session time: Mon Dec 20 07:40:34.045 2010 (UTC - 5:00)
System Uptime: 0 days 0:00:11.746
Loading Kernel Symbols
...............................................................
..............................................
Loading User Symbols
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
Use !analyze -v to get detailed debugging information.
BugCheck 1000007E, {ffffffffc0000005, fffff80002b49599, fffff88002fbcc28, fffff88002fbc490}
Probably caused by : USBPORT.SYS ( USBPORT!USBPORT_HalAllocateCommonBuffer+1c6 )
Followup: MachineOwner
---------
3: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
SYSTEM_THREAD_EXCEPTION_NOT_HANDLED_M (1000007e)
This is a very common bugcheck. Usually the exception address pinpoints
the driver/function that caused the problem. Always note this address
as well as the link date of the driver/image that contains this address.
Some common problems are exception code 0x80000003. This means a hard
coded breakpoint or assertion was hit, but this system was booted
/NODEBUG. This is not supposed to happen as developers should never have
hardcoded breakpoints in retail code, but ...
If this happens, make sure a debugger gets connected, and the
system is booted /DEBUG. This will let us see why this breakpoint is
happening.
Arguments:
Arg1: ffffffffc0000005, The exception code that was not handled
Arg2: fffff80002b49599, The address that the exception occurred at
Arg3: fffff88002fbcc28, Exception Record Address
Arg4: fffff88002fbc490, Context Record Address
Debugging Details:
------------------
EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - <Unable to get error code text>
FAULTING_IP:
nt!MiStealPage+c79
fffff800`02b49599 488b4b28 mov rcx,qword ptr [rbx+28h]
EXCEPTION_RECORD: fffff88002fbcc28 -- (.exr 0xfffff88002fbcc28)
ExceptionAddress: fffff80002b49599 (nt!MiStealPage+0x0000000000000c79)
ExceptionCode: c0000005 (Access violation)
ExceptionFlags: 00000000
NumberParameters: 2
Parameter[0]: 0000000000000000
Parameter[1]: ffffffffffffffff
Attempt to read from address ffffffffffffffff
CONTEXT: fffff88002fbc490 -- (.cxr 0xfffff88002fbc490)
rax=000fffffffffff7d rbx=02fffa7fffffe770 rcx=000fffffffffff7d
rdx=000fffffffffffff rsi=0000000000000000 rdi=0000000000000000
rip=fffff80002b49599 rsp=fffff88002fbce60 rbp=fffff88002fbcec0
r8=0000058000000000 r9=000fffffffffffff r10=0000000000000002
r11=fffff68000000000 r12=fffffa80026fd7e0 r13=0000000000000000
r14=00000000000cff2a r15=0000000000000000
iopl=0 nv up ei pl nz na pe nc
cs=0010 ss=0018 ds=002b es=002b fs=0053 gs=002b efl=00010202
nt!MiStealPage+0xc79:
fffff800`02b49599 488b4b28 mov rcx,qword ptr [rbx+28h] ds:002b:02fffa7f`ffffe798=????????????????
Resetting default scope
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT
PROCESS_NAME: System
CURRENT_IRQL: 2
ERROR_CODE: (NTSTATUS) 0xc0000005 - <Unable to get error code text>
EXCEPTION_PARAMETER1: 0000000000000000
EXCEPTION_PARAMETER2: ffffffffffffffff
READ_ADDRESS: GetPointerFromAddress: unable to read from fffff80002cab0e0
ffffffffffffffff
FOLLOWUP_IP:
USBPORT!USBPORT_HalAllocateCommonBuffer+1c6
fffff880`03e2d99e 488bf8 mov rdi,rax
BUGCHECK_STR: 0x7E
LOCK_ADDRESS: fffff80002c77400 -- (!locks fffff80002c77400)
Resource @ nt!PiEngineLock (0xfffff80002c77400) Available
WARNING: SystemResourcesList->Flink chain invalid. Resource may be corrupted, or already deleted.
WARNING: SystemResourcesList->Blink chain invalid. Resource may be corrupted, or already deleted.
1 total locks
PNP_TRIAGE:
Lock address : 0xfffff80002c77400
Thread Count : 0
Thread address: 0x0000000000000000
Thread wait : 0x0
LAST_CONTROL_TRANSFER: from fffff80002b4abbb to fffff80002b49599
STACK_TEXT:
fffff880`02fbce60 fffff800`02b4abbb : fffffa80`026fd7e0 fffffa80`026fd7e0 fffff6fc`40005d68 fffffa80`05490900 : nt!MiStealPage+0xc79
fffff880`02fbd0a0 fffff800`02b4bc00 : fffffa80`026fd7e0 00000000`00000001 00000000`00000001 fffff6fc`40005d68 : nt!MiClaimPhysicalRun+0x60b
fffff880`02fbd160 fffff800`02b85c95 : 00000000`00000000 00000000`000fffff 00000000`00100000 00000000`00000001 : nt!MiFindContiguousPages+0xb30
fffff880`02fbd280 fffff800`02b86c33 : 00000000`00002000 00000000`00000000 00000000`cd5a6000 fffff880`050c4000 : nt!MiAllocateContiguousMemory+0x2a5
fffff880`02fbd310 fffff800`02fe32a0 : 00000000`00000040 00000000`00001000 fffffa80`052209c0 fffffa80`052201a0 : nt!MmAllocateContiguousMemorySpecifyCache+0x53
fffff880`02fbd350 fffff880`03e2d99e : 00000000`00000000 00000000`00000000 fffffa80`052209a0 00000000`000007ff : hal!HalAllocateCommonBuffer+0x40
fffff880`02fbd390 fffff880`03e03799 : fffffa80`04ebd920 00000000`00000000 00000000`cd5a6000 fffff880`00f5cc6c : USBPORT!USBPORT_HalAllocateCommonBuffer+0x1c6
fffff880`02fbd400 fffff880`03e044e4 : fffffa80`05220960 00000000`c0000000 fffffa80`052201a0 00000000`00000001 : USBPORT!USBPORT_AllocateControllerCommonBuffers+0xa9
fffff880`02fbd450 fffff880`03e1959f : 00000000`00000000 fffffa80`0c031000 fffffa80`00000000 fffffa80`00000000 : USBPORT!USBPORT_StartDevice+0xb54
fffff880`02fbd680 fffff880`03e18f29 : fffffa80`047b46b0 fffffa80`052201a0 fffffa80`047b4600 fffffa80`047b4500 : USBPORT!USBPORT_DeferredStartDevice+0x43
fffff880`02fbd6b0 fffff880`03e048d5 : 00000000`00000000 fffff880`02fbd820 fffffa80`047b4550 fffffa80`039aca20 : USBPORT!USBPORT_FdoPnP+0x6c1
fffff880`02fbd760 fffff800`02e3206e : 00000000`00000000 fffffa80`039aca20 fffffa80`05288750 fffff880`009e9180 : USBPORT!USBPORT_DispatchPnP+0x1d
fffff880`02fbd790 fffff800`02b6d14d : fffffa80`039aca20 fffffa80`05288750 fffff800`02b72d30 00000000`00000000 : nt!PnpAsynchronousCall+0xce
fffff880`02fbd7d0 fffff800`02e3cdb6 : fffff800`02c771c0 fffffa80`039b2390 fffffa80`05288750 fffffa80`039b2538 : nt!PnpStartDevice+0x11d
fffff880`02fbd890 fffff800`02e3d054 : fffffa80`039b2390 fffffa80`03a2003c fffffa80`03a23d90 00000000`00000001 : nt!PnpStartDeviceNode+0x156
fffff880`02fbd920 fffff800`02e60346 : fffffa80`039b2390 fffffa80`03a23d90 00000000`00000002 00000000`00000000 : nt!PipProcessStartPhase1+0x74
fffff880`02fbd950 fffff800`02e607fc : fffffa80`050ca5c0 00000000`00000000 00000000`00000000 00000000`00000000 : nt!PipProcessDevNodeTree+0x296
fffff880`02fbdbc0 fffff800`02b75382 : 00000001`00000003 00000000`00000000 00000000`32706e50 00000000`00000084 : nt!PiProcessStartSystemDevices+0x7c
fffff880`02fbdc10 fffff800`02a80961 : fffff800`02b75080 fffff800`02ecae01 fffffa80`039ffb00 00000554`00000000 : nt!PnpDeviceActionWorker+0x302
fffff880`02fbdcb0 fffff800`02d17c06 : 00000554`00000000 fffffa80`039ffb60 00000000`00000080 fffffa80`039ea740 : nt!ExpWorkerThread+0x111
fffff880`02fbdd40 fffff800`02a51c26 : fffff880`02d63180 fffffa80`039ffb60 fffff880`02d6dfc0 00000554`00000000 : nt!PspSystemThreadStartup+0x5a
fffff880`02fbdd80 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KxStartSystemThread+0x16
SYMBOL_STACK_INDEX: 6
SYMBOL_NAME: USBPORT!USBPORT_HalAllocateCommonBuffer+1c6
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: USBPORT
IMAGE_NAME: USBPORT.SYS
DEBUG_FLR_IMAGE_TIMESTAMP: 4a5bcc07
STACK_COMMAND: .cxr 0xfffff88002fbc490 ; kb
FAILURE_BUCKET_ID: X64_0x7E_USBPORT!USBPORT_HalAllocateCommonBuffer+1c6
BUCKET_ID: X64_0x7E_USBPORT!USBPORT_HalAllocateCommonBuffer+1c6
Followup: MachineOwner
---------