Microsoft (R) Windows Debugger Version 6.12.0002.633 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [F:\DMP\040211-16239-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
Symbol search path is: SRV*c:\websymbols*http://msdl.microsoft.com/download/symbols
Executable search path is:
Windows 7 Kernel Version 7601 (Service Pack 1) MP (6 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS
Built by: 7601.17514.amd64fre.win7sp1_rtm.101119-1850
Machine Name:
Kernel base = 0xfffff800`02e1c000 PsLoadedModuleList = 0xfffff800`03061e90
Debug session time: Sat Apr 2 14:04:46.141 2011 (UTC - 4:00)
System Uptime: 0 days 11:33:28.105
Loading Kernel Symbols
...............................................................
................................................................
...................................
Loading User Symbols
Loading unloaded module list
........
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
Use !analyze -v to get detailed debugging information.
BugCheck 3B, {c0000005, fffff880043b6507, fffff880071abc30, 0}
Probably caused by : dxgmms1.sys ( dxgmms1!VIDMM_GLOBAL::CloseOneAllocation+17f )
Followup: MachineOwner
---------
5: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
SYSTEM_SERVICE_EXCEPTION (3b)
An exception happened while executing a system service routine.
Arguments:
Arg1: 00000000c0000005, Exception code that caused the bugcheck
Arg2: fffff880043b6507, Address of the instruction which caused the bugcheck
Arg3: fffff880071abc30, Address of the context record for the exception that caused the bugcheck
Arg4: 0000000000000000, zero.
Debugging Details:
------------------
EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - The instruction at 0x%08lx referenced memory at 0x%08lx. The memory could not be %s.
FAULTING_IP:
dxgmms1!VIDMM_GLOBAL::CloseOneAllocation+17f
fffff880`043b6507 488908 mov qword ptr [rax],rcx
CONTEXT: fffff880071abc30 -- (.cxr 0xfffff880071abc30)
rax=fffdf8a00878e2c8 rbx=fffffa80041fa010 rcx=fffff8a00878e2c8
rdx=fffffa80061f5000 rsi=fffff8a003cfd9b0 rdi=fffffa80061b3000
rip=fffff880043b6507 rsp=fffff880071ac610 rbp=0000000000000001
r8=fffffa80061b43e0 r9=0000000000000001 r10=0000000000000038
r11=fffff880071ac5e0 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=fffff8a00ac33120
iopl=0 nv up ei ng nz na po nc
cs=0010 ss=0018 ds=002b es=002b fs=0053 gs=002b efl=00010286
dxgmms1!VIDMM_GLOBAL::CloseOneAllocation+0x17f:
fffff880`043b6507 488908 mov qword ptr [rax],rcx ds:002b:fffdf8a0`0878e2c8=????????????????
Resetting default scope
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT
BUGCHECK_STR: 0x3B
PROCESS_NAME: Wow.exe
CURRENT_IRQL: 0
LAST_CONTROL_TRANSFER: from 0000000000000000 to fffff880043b6507
STACK_TEXT:
fffff880`071ac610 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : dxgmms1!VIDMM_GLOBAL::CloseOneAllocation+0x17f
FOLLOWUP_IP:
dxgmms1!VIDMM_GLOBAL::CloseOneAllocation+17f
fffff880`043b6507 488908 mov qword ptr [rax],rcx
SYMBOL_STACK_INDEX: 0
SYMBOL_NAME: dxgmms1!VIDMM_GLOBAL::CloseOneAllocation+17f
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: dxgmms1
IMAGE_NAME: dxgmms1.sys
DEBUG_FLR_IMAGE_TIMESTAMP: 4ce799c1
STACK_COMMAND: .cxr 0xfffff880071abc30 ; kb
FAILURE_BUCKET_ID: X64_0x3B_dxgmms1!VIDMM_GLOBAL::CloseOneAllocation+17f
BUCKET_ID: X64_0x3B_dxgmms1!VIDMM_GLOBAL::CloseOneAllocation+17f
Followup: MachineOwner
---------
Microsoft (R) Windows Debugger Version 6.12.0002.633 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [F:\DMP\041311-16255-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
Symbol search path is: SRV*c:\websymbols*http://msdl.microsoft.com/download/symbols
Executable search path is:
Windows 7 Kernel Version 7601 (Service Pack 1) MP (6 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS
Built by: 7601.17514.amd64fre.win7sp1_rtm.101119-1850
Machine Name:
Kernel base = 0xfffff800`02e16000 PsLoadedModuleList = 0xfffff800`0305be90
Debug session time: Tue Apr 12 16:12:09.501 2011 (UTC - 4:00)
System Uptime: 0 days 13:10:12.374
Loading Kernel Symbols
...............................................................
................................................................
..................................
Loading User Symbols
Loading unloaded module list
......
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
Use !analyze -v to get detailed debugging information.
BugCheck 1000007E, {ffffffffc0000005, fffff800031acb20, fffff88003397928, fffff88003397180}
Probably caused by : ntkrnlmp.exe ( nt!ObDereferenceSecurityDescriptor+20 )
Followup: MachineOwner
---------
2: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
SYSTEM_THREAD_EXCEPTION_NOT_HANDLED_M (1000007e)
This is a very common bugcheck. Usually the exception address pinpoints
the driver/function that caused the problem. Always note this address
as well as the link date of the driver/image that contains this address.
Some common problems are exception code 0x80000003. This means a hard
coded breakpoint or assertion was hit, but this system was booted
/NODEBUG. This is not supposed to happen as developers should never have
hardcoded breakpoints in retail code, but ...
If this happens, make sure a debugger gets connected, and the
system is booted /DEBUG. This will let us see why this breakpoint is
happening.
Arguments:
Arg1: ffffffffc0000005, The exception code that was not handled
Arg2: fffff800031acb20, The address that the exception occurred at
Arg3: fffff88003397928, Exception Record Address
Arg4: fffff88003397180, Context Record Address
Debugging Details:
------------------
EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - The instruction at 0x%08lx referenced memory at 0x%08lx. The memory could not be %s.
FAULTING_IP:
nt!ObDereferenceSecurityDescriptor+20
fffff800`031acb20 8b4610 mov eax,dword ptr [rsi+10h]
EXCEPTION_RECORD: fffff88003397928 -- (.exr 0xfffff88003397928)
ExceptionAddress: fffff800031acb20 (nt!ObDereferenceSecurityDescriptor+0x0000000000000020)
ExceptionCode: c0000005 (Access violation)
ExceptionFlags: 00000000
NumberParameters: 2
Parameter[0]: 0000000000000000
Parameter[1]: ffffffffffffffff
Attempt to read from address ffffffffffffffff
CONTEXT: fffff88003397180 -- (.cxr 0xfffff88003397180)
rax=fffff88003397b88 rbx=0000000000000000 rcx=fffdf8a00b3c9750
rdx=000000000000000e rsi=fffdf8a00b3c9730 rdi=0000000000000000
rip=fffff800031acb20 rsp=fffff88003397b60 rbp=fffffa8003ff2060
r8=0000000000000000 r9=0000000000000000 r10=0000000000000000
r11=0000000000000000 r12=000000000000000e r13=0000000000000000
r14=0000000000000000 r15=0000000000000001
iopl=0 nv up ei ng nz na po nc
cs=0010 ss=0018 ds=002b es=002b fs=0053 gs=002b efl=00010286
nt!ObDereferenceSecurityDescriptor+0x20:
fffff800`031acb20 8b4610 mov eax,dword ptr [rsi+10h] ds:002b:fffdf8a0`0b3c9740=????????
Resetting default scope
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT
PROCESS_NAME: System
CURRENT_IRQL: 0
ERROR_CODE: (NTSTATUS) 0xc0000005 - The instruction at 0x%08lx referenced memory at 0x%08lx. The memory could not be %s.
EXCEPTION_PARAMETER1: 0000000000000000
EXCEPTION_PARAMETER2: ffffffffffffffff
READ_ADDRESS: GetPointerFromAddress: unable to read from fffff800030c70e8
ffffffffffffffff
FOLLOWUP_IP:
nt!ObDereferenceSecurityDescriptor+20
fffff800`031acb20 8b4610 mov eax,dword ptr [rsi+10h]
BUGCHECK_STR: 0x7E
LAST_CONTROL_TRANSFER: from fffff80003180698 to fffff800031acb20
STACK_TEXT:
fffff880`03397b60 fffff800`03180698 : 00000000`00000000 fffffa80`03ff2060 fffffa80`03973af0 00000000`00000000 : nt!ObDereferenceSecurityDescriptor+0x20
fffff880`03397b90 fffff800`0316b4c8 : fffffa80`03ff2030 fffffa80`03ff2060 fffffa80`03973af0 00000000`00000000 : nt!SeDefaultObjectMethod+0xa8
fffff880`03397be0 fffff800`02e82a93 : 00000000`00000000 00000000`00000000 fffffa80`03ff2060 00000000`00000001 : nt!ObpRemoveObjectRoutine+0xac
fffff880`03397c40 fffff800`02e7634d : 00000000`00000000 fffffa80`03ac4b60 fffffa80`03ff23f0 fffffa80`03ac4b60 : nt!ObfDereferenceObjectWithTag+0x93
fffff880`03397c80 fffff800`02ea0a21 : fffff800`02e762b4 fffff800`030336b0 fffffa80`03ac4b60 00000000`00000000 : nt!PspReaper+0x99
fffff880`03397cb0 fffff800`03133cce : 00000000`00000000 fffffa80`03ac4b60 00000000`00000080 fffffa80`039d4040 : nt!ExpWorkerThread+0x111
fffff880`03397d40 fffff800`02e87fe6 : fffff880`03287180 fffffa80`03ac4b60 fffff880`03292040 00000000`00000000 : nt!PspSystemThreadStartup+0x5a
fffff880`03397d80 00000000`00000000 : fffff880`03398000 fffff880`03392000 fffff880`033979e0 00000000`00000000 : nt!KxStartSystemThread+0x16
SYMBOL_STACK_INDEX: 0
SYMBOL_NAME: nt!ObDereferenceSecurityDescriptor+20
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: nt
IMAGE_NAME: ntkrnlmp.exe
DEBUG_FLR_IMAGE_TIMESTAMP: 4ce7951a
STACK_COMMAND: .cxr 0xfffff88003397180 ; kb
FAILURE_BUCKET_ID: X64_0x7E_nt!ObDereferenceSecurityDescriptor+20
BUCKET_ID: X64_0x7E_nt!ObDereferenceSecurityDescriptor+20
Followup: MachineOwner
---------
Microsoft (R) Windows Debugger Version 6.12.0002.633 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [F:\DMP\041011-21262-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
Symbol search path is: SRV*c:\websymbols*http://msdl.microsoft.com/download/symbols
Executable search path is:
Windows 7 Kernel Version 7601 (Service Pack 1) MP (6 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS
Built by: 7601.17514.amd64fre.win7sp1_rtm.101119-1850
Machine Name:
Kernel base = 0xfffff800`02e18000 PsLoadedModuleList = 0xfffff800`0305de90
Debug session time: Sun Apr 10 08:00:38.133 2011 (UTC - 4:00)
System Uptime: 0 days 0:01:33.005
Loading Kernel Symbols
...............................................................
................................................................
................................
Loading User Symbols
Loading unloaded module list
....
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
Use !analyze -v to get detailed debugging information.
BugCheck 3B, {c0000005, fffff8800194cab6, fffff8800635cb40, 0}
Probably caused by : tcpip.sys ( tcpip!IpGetAllSubInterfaceParameters+1d6 )
Followup: MachineOwner
---------
3: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
SYSTEM_SERVICE_EXCEPTION (3b)
An exception happened while executing a system service routine.
Arguments:
Arg1: 00000000c0000005, Exception code that caused the bugcheck
Arg2: fffff8800194cab6, Address of the instruction which caused the bugcheck
Arg3: fffff8800635cb40, Address of the context record for the exception that caused the bugcheck
Arg4: 0000000000000000, zero.
Debugging Details:
------------------
EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - The instruction at 0x%08lx referenced memory at 0x%08lx. The memory could not be %s.
FAULTING_IP:
tcpip!IpGetAllSubInterfaceParameters+1d6
fffff880`0194cab6 488b5018 mov rdx,qword ptr [rax+18h]
CONTEXT: fffff8800635cb40 -- (.cxr 0xfffff8800635cb40)
rax=fffdfa800485eaa0 rbx=0000000000000005 rcx=fffff8800635d540
rdx=0000000000000000 rsi=fffffa80067a8b40 rdi=fffff8800635d670
rip=fffff8800194cab6 rsp=fffff8800635d520 rbp=fffffa8003c004c8
r8=00000000fc01020a r9=fffffa80067f2010 r10=0000000000000000
r11=fffff8800635d4f0 r12=0000000000000006 r13=ffffffffffffffff
r14=fffff88001a2e800 r15=0000000000000000
iopl=0 nv up ei ng nz na po nc
cs=0010 ss=0018 ds=002b es=002b fs=0053 gs=002b efl=00010286
tcpip!IpGetAllSubInterfaceParameters+0x1d6:
fffff880`0194cab6 488b5018 mov rdx,qword ptr [rax+18h] ds:002b:fffdfa80`0485eab8=????????????????
Resetting default scope
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT
BUGCHECK_STR: 0x3B
PROCESS_NAME: svchost.exe
CURRENT_IRQL: 0
LAST_CONTROL_TRANSFER: from 0000000000000000 to fffff8800194cab6
STACK_TEXT:
fffff880`0635d520 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : tcpip!IpGetAllSubInterfaceParameters+0x1d6
FOLLOWUP_IP:
tcpip!IpGetAllSubInterfaceParameters+1d6
fffff880`0194cab6 488b5018 mov rdx,qword ptr [rax+18h]
SYMBOL_STACK_INDEX: 0
SYMBOL_NAME: tcpip!IpGetAllSubInterfaceParameters+1d6
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: tcpip
IMAGE_NAME: tcpip.sys
DEBUG_FLR_IMAGE_TIMESTAMP: 4ce79420
STACK_COMMAND: .cxr 0xfffff8800635cb40 ; kb
FAILURE_BUCKET_ID: X64_0x3B_tcpip!IpGetAllSubInterfaceParameters+1d6
BUCKET_ID: X64_0x3B_tcpip!IpGetAllSubInterfaceParameters+1d6
Followup: MachineOwner
---------
Microsoft (R) Windows Debugger Version 6.12.0002.633 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [F:\DMP\041511-17316-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
Symbol search path is: SRV*c:\websymbols*http://msdl.microsoft.com/download/symbols
Executable search path is:
Windows 7 Kernel Version 7601 (Service Pack 1) MP (6 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS
Built by: 7601.17514.amd64fre.win7sp1_rtm.101119-1850
Machine Name:
Kernel base = 0xfffff800`02e54000 PsLoadedModuleList = 0xfffff800`03099e90
Debug session time: Fri Apr 15 14:25:49.413 2011 (UTC - 4:00)
System Uptime: 0 days 11:17:40.646
Loading Kernel Symbols
...............................................................
................................................................
..................................
Loading User Symbols
Loading unloaded module list
......
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
Use !analyze -v to get detailed debugging information.
BugCheck 3B, {c0000005, fffff800031eab20, fffff88009167080, 0}
Probably caused by : ntkrnlmp.exe ( nt!ObDereferenceSecurityDescriptor+20 )
Followup: MachineOwner
---------
1: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
SYSTEM_SERVICE_EXCEPTION (3b)
An exception happened while executing a system service routine.
Arguments:
Arg1: 00000000c0000005, Exception code that caused the bugcheck
Arg2: fffff800031eab20, Address of the instruction which caused the bugcheck
Arg3: fffff88009167080, Address of the context record for the exception that caused the bugcheck
Arg4: 0000000000000000, zero.
Debugging Details:
------------------
EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - The instruction at 0x%08lx referenced memory at 0x%08lx. The memory could not be %s.
FAULTING_IP:
nt!ObDereferenceSecurityDescriptor+20
fffff800`031eab20 8b4610 mov eax,dword ptr [rsi+10h]
CONTEXT: fffff88009167080 -- (.cxr 0xfffff88009167080)
rax=fffff88009167a88 rbx=0000000000000000 rcx=fffdf8a00956b760
rdx=000000000000000e rsi=fffdf8a00956b740 rdi=0000000000000000
rip=fffff800031eab20 rsp=fffff88009167a60 rbp=fffffa800716a060
r8=0000000000000000 r9=0000000000000000 r10=0000000000000000
r11=fffff88009167b38 r12=000000000000000e r13=fffffa800745c340
r14=000000000009e500 r15=fffff8a003cb84d0
iopl=0 nv up ei ng nz na po nc
cs=0010 ss=0018 ds=002b es=002b fs=0053 gs=002b efl=00010286
nt!ObDereferenceSecurityDescriptor+0x20:
fffff800`031eab20 8b4610 mov eax,dword ptr [rsi+10h] ds:002b:fffdf8a0`0956b750=????????
Resetting default scope
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT
BUGCHECK_STR: 0x3B
PROCESS_NAME: Wow.exe
CURRENT_IRQL: 0
LAST_CONTROL_TRANSFER: from fffff800031be698 to fffff800031eab20
STACK_TEXT:
fffff880`09167a60 fffff800`031be698 : 00000000`00000000 fffffa80`0716a060 fffffa80`03973af0 00000000`00000000 : nt!ObDereferenceSecurityDescriptor+0x20
fffff880`09167a90 fffff800`02ede54e : 00000000`00000000 fffffa80`0745c340 fffffa80`03973af0 00000000`0009da90 : nt!SeDefaultObjectMethod+0xa8
fffff880`09167ae0 fffff800`031cb484 : fffffa80`0745c340 00000000`00000000 fffffa80`0478bb60 00000000`00000000 : nt!ObfDereferenceObject+0x10e
fffff880`09167b40 fffff800`031cba34 : 00000000`000028b0 fffffa80`0745c340 fffff8a0`03cb84d0 00000000`000028b0 : nt!ObpCloseHandleTableEntry+0xc4
fffff880`09167bd0 fffff800`02ed38d3 : fffffa80`0478bb60 fffff880`09167ca0 00000000`7efdb000 fffffa80`0716a060 : nt!ObpCloseHandle+0x94
fffff880`09167c20 00000000`76f1140a : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x13
00000000`0009dbd8 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x76f1140a
FOLLOWUP_IP:
nt!ObDereferenceSecurityDescriptor+20
fffff800`031eab20 8b4610 mov eax,dword ptr [rsi+10h]
SYMBOL_STACK_INDEX: 0
SYMBOL_NAME: nt!ObDereferenceSecurityDescriptor+20
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: nt
IMAGE_NAME: ntkrnlmp.exe
DEBUG_FLR_IMAGE_TIMESTAMP: 4ce7951a
STACK_COMMAND: .cxr 0xfffff88009167080 ; kb
FAILURE_BUCKET_ID: X64_0x3B_nt!ObDereferenceSecurityDescriptor+20
BUCKET_ID: X64_0x3B_nt!ObDereferenceSecurityDescriptor+20
Followup: MachineOwner
---------