Code:
Microsoft (R) Windows Debugger Version 6.11.0001.404 X86
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [C:\Users\Owner\AppData\Local\Temp\Temp1_Dumps.zip\080310-15709-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
Symbol search path is: SRV*c:\symbols*Symbol information
Executable search path is:
Windows 7 Kernel Version 7600 MP (8 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS Personal
Built by: 7600.16539.amd64fre.win7_gdr.100226-1909
Machine Name:
Kernel base = 0xfffff800`02a55000 PsLoadedModuleList = 0xfffff800`02c92e50
Debug session time: Wed Aug 4 01:30:36.180 2010 (GMT-4)
System Uptime: 0 days 9:07:50.242
Loading Kernel Symbols
...............................................................
................................................................
............
Loading User Symbols
Loading unloaded module list
.......
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
Use !analyze -v to get detailed debugging information.
BugCheck 1A, {31, fffffa8005d8f150, fffff88007ff6000, fffff8a00233000c}
Probably caused by : ntkrnlmp.exe ( nt! ?? ::NNGAKEGL::`string'+6378 )
Followup: MachineOwner
---------
6: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
MEMORY_MANAGEMENT (1a)
# Any other values for parameter 1 must be individually examined.
Arguments:
Arg1: 0000000000000031, The subtype of the bugcheck.
Arg2: fffffa8005d8f150
Arg3: fffff88007ff6000
Arg4: fffff8a00233000c
Debugging Details:
------------------
BUGCHECK_STR: 0x1a_31
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT
PROCESS_NAME: PerfTuneServic
CURRENT_IRQL: 0
LAST_CONTROL_TRANSFER: from fffff80002df6b2d to fffff80002ac5600
STACK_TEXT:
fffff880`07212848 fffff800`02df6b2d : 00000000`0000001a 00000000`00000031 fffffa80`05d8f150 fffff880`07ff6000 : nt!KeBugCheckEx
fffff880`07212850 fffff800`02dadf45 : fffff880`07ff6000 ffffffff`f8e40000 00000000`004a0000 fffffa80`015122a0 : nt! ?? ::NNGAKEGL::`string'+0x6378
fffff880`072128a0 fffff800`02d9b17c : fffffa80`00000000 fffffa80`05cda060 00000000`00000000 fffffa80`00000000 : nt!MiPerformFixups+0x65
fffff880`072128f0 fffff800`02ab6b4c : fffffa80`015122a0 fffffa80`05ce3d40 00000000`00000000 fffffa80`06acea00 : nt!MiRelocateImagePfn+0x114
fffff880`07212950 fffff800`02ab742b : fffffa80`05ce3c80 fffff880`07212a80 fffffa80`068ccec8 fffff800`02ddc7d7 : nt!MiWaitForInPageComplete+0x89c
fffff880`07212a30 fffff800`02ae079b : 00000000`00000000 00000000`00000000 ffffffff`ffffffff fffff800`00000000 : nt!MiIssueHardFault+0x28b
fffff880`07212ac0 fffff800`02ac36ee : 00000000`00000008 00000000`72cb0000 00000000`b2808e01 00000000`7efdb000 : nt!MmAccessFault+0x14bb
fffff880`07212c20 00000000`7314be2f : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiPageFault+0x16e
00000000`0030f638 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x7314be2f
STACK_COMMAND: kb
FOLLOWUP_IP:
nt! ?? ::NNGAKEGL::`string'+6378
fffff800`02df6b2d cc int 3
SYMBOL_STACK_INDEX: 1
SYMBOL_NAME: nt! ?? ::NNGAKEGL::`string'+6378
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: nt
IMAGE_NAME: ntkrnlmp.exe
DEBUG_FLR_IMAGE_TIMESTAMP: 4b88cfeb
FAILURE_BUCKET_ID: X64_0x1a_31_nt!_??_::NNGAKEGL::_string_+6378
BUCKET_ID: X64_0x1a_31_nt!_??_::NNGAKEGL::_string_+6378
Followup: MachineOwner
---------
Microsoft (R) Windows Debugger Version 6.11.0001.404 X86
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [C:\Users\Owner\AppData\Local\Temp\Temp1_Dumps.zip\080810-14757-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
Symbol search path is: SRV*c:\symbols*Symbol information
Executable search path is:
Windows 7 Kernel Version 7600 MP (8 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS Personal
Built by: 7600.16539.amd64fre.win7_gdr.100226-1909
Machine Name:
Kernel base = 0xfffff800`02a4c000 PsLoadedModuleList = 0xfffff800`02c89e50
Debug session time: Sun Aug 8 14:53:42.720 2010 (GMT-4)
System Uptime: 0 days 0:28:57.782
Loading Kernel Symbols
...............................................................
................................................................
............
Loading User Symbols
Loading unloaded module list
.....
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
Use !analyze -v to get detailed debugging information.
BugCheck 7F, {8, 80050031, 6f8, fffff88005509cab}
*** WARNING: Unable to verify timestamp for win32k.sys
*** ERROR: Module load completed but symbols could not be loaded for win32k.sys
Probably caused by : memory_corruption
Followup: memory_corruption
---------
0: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
UNEXPECTED_KERNEL_MODE_TRAP (7f)
This means a trap occurred in kernel mode, and it's a trap of a kind
that the kernel isn't allowed to have/catch (bound trap) or that
is always instant death (double fault). The first number in the
bugcheck params is the number of the trap (8 = double fault, etc)
Consult an Intel x86 family manual to learn more about what these
traps are. Here is a *portion* of those codes:
If kv shows a taskGate
use .tss on the part before the colon, then kv.
Else if kv shows a trapframe
use .trap on that value
Else
.trap on the appropriate frame will show where the trap was taken
(on x86, this will be the ebp that goes with the procedure KiTrap)
Endif
kb will then show the corrected stack.
Arguments:
Arg1: 0000000000000008, EXCEPTION_DOUBLE_FAULT
Arg2: 0000000080050031
Arg3: 00000000000006f8
Arg4: fffff88005509cab
Debugging Details:
------------------
BUGCHECK_STR: 0x7f_8
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: CODE_CORRUPTION
PROCESS_NAME: System
CURRENT_IRQL: 0
LAST_CONTROL_TRANSFER: from fffff80002abbb69 to fffff80002abc600
STACK_TEXT:
fffff800`00ba4d28 fffff800`02abbb69 : 00000000`0000007f 00000000`00000008 00000000`80050031 00000000`000006f8 : nt!KeBugCheckEx
fffff800`00ba4d30 fffff800`02aba032 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiBugCheckDispatch+0x69
fffff800`00ba4e70 fffff880`05509cab : ffff1bf8`890fc085 ffff1bf3`e9e08b44 1c26850f`01487f83 84000180`04e8ffff : nt!KiDoubleFaultAbort+0xb2
fffff880`054d5a0d ffff1bf8`890fc085 : ffff1bf3`e9e08b44 1c26850f`01487f83 84000180`04e8ffff b8ffff1c`19850fc0 : HTTP!UlpSetUrlInfoSpecial+0xb
fffff880`054d5a15 ffff1bf3`e9e08b44 : 1c26850f`01487f83 84000180`04e8ffff b8ffff1c`19850fc0 ff1c12e9`c0000022 : 0xffff1bf8`890fc085
fffff880`054d5a1d 1c26850f`01487f83 : 84000180`04e8ffff b8ffff1c`19850fc0 ff1c12e9`c0000022 1bd4e941`24448aff : 0xffff1bf3`e9e08b44
fffff880`054d5a25 84000180`04e8ffff : b8ffff1c`19850fc0 ff1c12e9`c0000022 1bd4e941`24448aff 8affff1b`e1e9ffff : 0x1c26850f`01487f83
fffff880`054d5a2d b8ffff1c`19850fc0 : ff1c12e9`c0000022 1bd4e941`24448aff 8affff1b`e1e9ffff ed840fc0`84412444 : 0x84000180`04e8ffff
fffff880`054d5a35 ff1c12e9`c0000022 : 1bd4e941`24448aff 8affff1b`e1e9ffff ed840fc0`84412444 0f01fe80`41fffffd : 0xb8ffff1c`19850fc0
fffff880`054d5a3d 1bd4e941`24448aff : 8affff1b`e1e9ffff ed840fc0`84412444 0f01fe80`41fffffd 3abc41ff`ff1beb85 : 0xff1c12e9`c0000022
fffff880`054d5a45 8affff1b`e1e9ffff : ed840fc0`84412444 0f01fe80`41fffffd 3abc41ff`ff1beb85 ffff1be0`e9c00000 : 0x1bd4e941`24448aff
fffff880`054d5a4d ed840fc0`84412444 : 0f01fe80`41fffffd 3abc41ff`ff1beb85 ffff1be0`e9c00000 c418850f`6873394c : 0x8affff1b`e1e9ffff
fffff880`054d5a55 0f01fe80`41fffffd : 3abc41ff`ff1beb85 ffff1be0`e9c00000 c418850f`6873394c 66ffffc3`e9e9ffff : 0xed840fc0`84412444
fffff880`054d5a5d 3abc41ff`ff1beb85 : ffff1be0`e9c00000 c418850f`6873394c 66ffffc3`e9e9ffff c7fa8166`0190ea81 : 0xf01fe80`41fffffd
fffff880`054d5a65 ffff1be0`e9c00000 : c418850f`6873394c 66ffffc3`e9e9ffff c7fa8166`0190ea81 e9ffffc4`57860f00 : 0x3abc41ff`ff1beb85
fffff880`054d5a6d c418850f`6873394c : 66ffffc3`e9e9ffff c7fa8166`0190ea81 e9ffffc4`57860f00 90ea8166`ffffc6ea : 0xffff1be0`e9c00000
fffff880`054d5a75 66ffffc3`e9e9ffff : c7fa8166`0190ea81 e9ffffc4`57860f00 90ea8166`ffffc6ea 860f00c7`fa816601 : 0xc418850f`6873394c
fffff880`054d5a7d c7fa8166`0190ea81 : e9ffffc4`57860f00 90ea8166`ffffc6ea 860f00c7`fa816601 ffc43de9`ffffc6da : 0x66ffffc3`e9e9ffff
fffff880`054d5a85 e9ffffc4`57860f00 : 90ea8166`ffffc6ea 860f00c7`fa816601 ffc43de9`ffffc6da f9833774`01e983ff : 0xc7fa8166`0190ea81
fffff880`054d5a8d 90ea8166`ffffc6ea : 860f00c7`fa816601 ffc43de9`ffffc6da f9833774`01e983ff 00d02484`c7107401 : 0xe9ffffc4`57860f00
fffff880`054d5a95 860f00c7`fa816601 : ffc43de9`ffffc6da f9833774`01e983ff 00d02484`c7107401 b3e9c000`01840000 : 0x90ea8166`ffffc6ea
fffff880`054d5a9d ffc43de9`ffffc6da : f9833774`01e983ff 00d02484`c7107401 b3e9c000`01840000 021c86b7`0fffffc6 : 0x860f00c7`fa816601
fffff880`054d5aa5 f9833774`01e983ff : 00d02484`c7107401 b3e9c000`01840000 021c86b7`0fffffc6 00000081`888d0000 : 0xffc43de9`ffffc6da
fffff880`054d5aad 00d02484`c7107401 : b3e9c000`01840000 021c86b7`0fffffc6 00000081`888d0000 ffffc4ab`830fc83b : 0xf9833774`01e983ff
fffff880`054d5ab5 b3e9c000`01840000 : 021c86b7`0fffffc6 00000081`888d0000 ffffc4ab`830fc83b 000000d0`24ac8944 : 0xd02484`c7107401
fffff880`054d5abd 021c86b7`0fffffc6 : 00000081`888d0000 ffffc4ab`830fc83b 000000d0`24ac8944 86b70fff`ffc691e9 : 0xb3e9c000`01840000
fffff880`054d5ac5 00000081`888d0000 : ffffc4ab`830fc83b 000000d0`24ac8944 86b70fff`ffc691e9 00ab888d`0000021c : 0x21c86b7`0fffffc6
fffff880`054d5acd ffffc4ab`830fc83b : 000000d0`24ac8944 86b70fff`ffc691e9 00ab888d`0000021c c489830f`c83b0000 : 0x81`888d0000
fffff880`054d5ad5 000000d0`24ac8944 : 86b70fff`ffc691e9 00ab888d`0000021c c489830f`c83b0000 00d024ac`8944ffff : 0xffffc4ab`830fc83b
fffff880`054d5add 86b70fff`ffc691e9 : 00ab888d`0000021c c489830f`c83b0000 00d024ac`8944ffff 41ffffc6`6fe90000 : 0xd0`24ac8944
fffff880`054d5ae5 00ab888d`0000021c : c489830f`c83b0000 00d024ac`8944ffff 41ffffc6`6fe90000 45ffffc4`34e9c98b : 0x86b70fff`ffc691e9
fffff880`054d5aed c489830f`c83b0000 : 00d024ac`8944ffff 41ffffc6`6fe90000 45ffffc4`34e9c98b 0f000006`6124b438 : 0xab888d`0000021c
fffff880`054d5af5 00d024ac`8944ffff : 41ffffc6`6fe90000 45ffffc4`34e9c98b 0f000006`6124b438 b70f45ff`ffc43684 : 0xc489830f`c83b0000
fffff880`054d5afd 41ffffc6`6fe90000 : 45ffffc4`34e9c98b 0f000006`6124b438 b70f45ff`ffc43684 45660000`03d02484 : 0xd024ac`8944ffff
fffff880`054d5b05 45ffffc4`34e9c98b : 0f000006`6124b438 b70f45ff`ffc43684 45660000`03d02484 42c18b45`0d76c13b : 0x41ffffc6`6fe90000
fffff880`054d5b0d 0f000006`6124b438 : b70f45ff`ffc43684 45660000`03d02484 42c18b45`0d76c13b ffc41ae9`02094c8d : 0x45ffffc4`34e9c98b
fffff880`054d5b15 b70f45ff`ffc43684 : 45660000`03d02484 42c18b45`0d76c13b ffc41ae9`02094c8d 4c8d42c0`b70f45ff : 0xf000006`6124b438
fffff880`054d5b1d 45660000`03d02484 : 42c18b45`0d76c13b ffc41ae9`02094c8d 4c8d42c0`b70f45ff 45ffffc4`0ce90201 : 0xb70f45ff`ffc43684
fffff880`054d5b25 42c18b45`0d76c13b : ffc41ae9`02094c8d 4c8d42c0`b70f45ff 45ffffc4`0ce90201 0f000006`6c24b438 : 0x45660000`03d02484
fffff880`054d5b2d ffc41ae9`02094c8d : 4c8d42c0`b70f45ff 45ffffc4`0ce90201 0f000006`6c24b438 b70f45ff`ffc40884 : 0x42c18b45`0d76c13b
fffff880`054d5b35 4c8d42c0`b70f45ff : 45ffffc4`0ce90201 0f000006`6c24b438 b70f45ff`ffc40884 45660000`04802484 : 0xffc41ae9`02094c8d
fffff880`054d5b3d 45ffffc4`0ce90201 : 0f000006`6c24b438 b70f45ff`ffc40884 45660000`04802484 42c18b45`0d76c13b : 0x4c8d42c0`b70f45ff
fffff880`054d5b45 0f000006`6c24b438 : b70f45ff`ffc40884 45660000`04802484 42c18b45`0d76c13b ffc3ece9`02094c8d : 0x45ffffc4`0ce90201
fffff880`054d5b4d b70f45ff`ffc40884 : 45660000`04802484 42c18b45`0d76c13b ffc3ece9`02094c8d 4c8d42c0`b70f45ff : 0xf000006`6c24b438
fffff880`054d5b55 45660000`04802484 : 42c18b45`0d76c13b ffc3ece9`02094c8d 4c8d42c0`b70f45ff 45ffffc3`dee90201 : 0xb70f45ff`ffc40884
fffff880`054d5b5d 42c18b45`0d76c13b : ffc3ece9`02094c8d 4c8d42c0`b70f45ff 45ffffc3`dee90201 0f000006`6424b438 : 0x45660000`04802484
fffff880`054d5b65 ffc3ece9`02094c8d : 4c8d42c0`b70f45ff 45ffffc3`dee90201 0f000006`6424b438 b70f41ff`ffc3da84 : 0x42c18b45`0d76c13b
fffff880`054d5b6d 4c8d42c0`b70f45ff : 45ffffc3`dee90201 0f000006`6424b438 b70f41ff`ffc3da84 41660000`04002484 : 0xffc3ece9`02094c8d
fffff880`054d5b75 45ffffc3`dee90201 : 0f000006`6424b438 b70f41ff`ffc3da84 41660000`04002484 c8b70f44`0477c13b : 0x4c8d42c0`b70f45ff
fffff880`054d5b7d 0f000006`6424b438 : b70f41ff`ffc3da84 41660000`04002484 c8b70f44`0477c13b c3bde902`094c8d42 : 0x45ffffc3`dee90201
fffff880`054d5b85 b70f41ff`ffc3da84 : 41660000`04002484 c8b70f44`0477c13b c3bde902`094c8d42 0000d024`8c8bffff : 0xf000006`6424b438
fffff880`054d5b8d 41660000`04002484 : c8b70f44`0477c13b c3bde902`094c8d42 0000d024`8c8bffff ffc3bbe9`c58b4100 : 0xb70f41ff`ffc3da84
fffff880`054d5b95 c8b70f44`0477c13b : c3bde902`094c8d42 0000d024`8c8bffff ffc3bbe9`c58b4100 000000d0`2484c7ff : 0x41660000`04002484
fffff880`054d5b9d c3bde902`094c8d42 : 0000d024`8c8bffff ffc3bbe9`c58b4100 000000d0`2484c7ff ffc5ade9`c000009a : 0xc8b70f44`0477c13b
fffff880`054d5ba5 0000d024`8c8bffff : ffc3bbe9`c58b4100 000000d0`2484c7ff ffc5ade9`c000009a 90fffc64`f415ffff : 0xc3bde902`094c8d42
fffff880`054d5bad ffc3bbe9`c58b4100 : 000000d0`2484c7ff ffc5ade9`c000009a 90fffc64`f415ffff 01e983ff`ffc3f5e9 : 0xd024`8c8bffff
fffff880`054d5bb5 000000d0`2484c7ff : ffc5ade9`c000009a 90fffc64`f415ffff 01e983ff`ffc3f5e9 c7107401`f9834c74 : 0xffc3bbe9`c58b4100
fffff880`054d5bbd ffc5ade9`c000009a : 90fffc64`f415ffff 01e983ff`ffc3f5e9 c7107401`f9834c74 01840000`00d02484 : 0xd0`2484c7ff
fffff880`054d5bc5 90fffc64`f415ffff : 01e983ff`ffc3f5e9 c7107401`f9834c74 01840000`00d02484 48ffffc5`87e9c000 : 0xffc5ade9`c000009a
fffff880`054d5bcd 01e983ff`ffc3f5e9 : c7107401`f9834c74 01840000`00d02484 48ffffc5`87e9c000 b0c9e8cf`8b48d68b : 0x90fffc64`f415ffff
fffff880`054d5bd5 c7107401`f9834c74 : 01840000`00d02484 48ffffc5`87e9c000 b0c9e8cf`8b48d68b 84891578`c085fffb : 0x1e983ff`ffc3f5e9
fffff880`054d5bdd 01840000`00d02484 : 48ffffc5`87e9c000 b0c9e8cf`8b48d68b 84891578`c085fffb 39446600`0000d024 : 0xc7107401`f9834c74
fffff880`054d5be5 48ffffc5`87e9c000 : b0c9e8cf`8b48d68b 84891578`c085fffb 39446600`0000d024 f9850f00`0000b8b7 : 0x1840000`00d02484
fffff880`054d5bed b0c9e8cf`8b48d68b : 84891578`c085fffb 39446600`0000d024 f9850f00`0000b8b7 00000dbd`41ffffc3 : 0x48ffffc5`87e9c000
fffff880`054d5bf5 84891578`c085fffb : 39446600`0000d024 f9850f00`0000b8b7 00000dbd`41ffffc3 0000d024`ac8944c0 : 0xb0c9e8cf`8b48d68b
fffff880`054d5bfd 39446600`0000d024 : f9850f00`0000b8b7 00000dbd`41ffffc3 0000d024`ac8944c0 8b48ffff`c550e900 : 0x84891578`c085fffb
fffff880`054d5c05 f9850f00`0000b8b7 : 00000dbd`41ffffc3 0000d024`ac8944c0 8b48ffff`c550e900 fbadd2e8`cf8b48d6 : 0x39446600`0000d024
fffff880`054d5c0d 00000dbd`41ffffc3 : 0000d024`ac8944c0 8b48ffff`c550e900 fbadd2e8`cf8b48d6 24848915`78c085ff : 0xf9850f00`0000b8b7
fffff880`054d5c15 0000d024`ac8944c0 : 8b48ffff`c550e900 fbadd2e8`cf8b48d6 24848915`78c085ff b7394466`000000d0 : 0xdbd`41ffffc3
fffff880`054d5c1d 8b48ffff`c550e900 : fbadd2e8`cf8b48d6 24848915`78c085ff b7394466`000000d0 c3c2850f`000000b8 : 0xd024`ac8944c0
fffff880`054d5c25 fbadd2e8`cf8b48d6 : 24848915`78c085ff b7394466`000000d0 c3c2850f`000000b8 c000000d`bd41ffff : 0x8b48ffff`c550e900
fffff880`054d5c2d 24848915`78c085ff : b7394466`000000d0 c3c2850f`000000b8 c000000d`bd41ffff 000000d0`24ac8944 : 0xfbadd2e8`cf8b48d6
fffff880`054d5c35 b7394466`000000d0 : c3c2850f`000000b8 c000000d`bd41ffff 000000d0`24ac8944 d68b48ff`ffc519e9 : 0x24848915`78c085ff
fffff880`054d5c3d c3c2850f`000000b8 : c000000d`bd41ffff 000000d0`24ac8944 d68b48ff`ffc519e9 00019f4b`e8cf8b48 : 0xb7394466`000000d0
fffff880`054d5c45 c000000d`bd41ffff : 000000d0`24ac8944 d68b48ff`ffc519e9 00019f4b`e8cf8b48 15ffffff`c3e8e990 : 0xc3c2850f`000000b8
STACK_COMMAND: kb
CHKIMG_EXTENSION: !chkimg -lo 50 -db !HTTP
255 errors : !HTTP (fffff88005509002-fffff88005509fba)
fffff88005509000 b9 c5 *b0 00 c0 ff 15 b5 36 f9 *66 41 f6 42 0a 05 ........6.fA.B..
fffff88005509010 74 06 *ea 8b 42 18 eb 1c 44 89 *ca 24 28 44 89 74 t...B...D..$(D.t
fffff88005509020 24 20 *83 33 c9 33 d2 45 8d 41 *fa 49 8b ca ff 15 $ .3.3.E.A.I....
fffff88005509030 1c 31 *7a ff 48 89 84 24 80 00 *58 00 49 3b c6 75 .1z.H..$..X.I;.u
...
fffff88005509080 64 36 *dd ff 48 8b 4b 08 8a 41 *1e 02 41 20 a8 03 d6..H.K..A..A ..
fffff88005509090 74 0b *0a c5 02 00 c0 ff 15 23 *40 f9 ff f6 41 0a t........#@...A.
fffff880055090a0 05 74 *f5 48 8b 41 18 eb 19 44 *5a 74 24 28 44 89 .t.H.A...DZt$(D.
fffff880055090b0 74 24 *33 45 33 c9 33 d2 45 8d *b9 01 ff 15 8e 30 t$3E3.3.E......0
...
fffff88005509100 39 57 *6f 72 70 48 8b cb ff 15 *7b 35 f9 ff 48 8b 9WorpH....{5..H.
fffff88005509110 4b 08 *46 41 2c 02 41 20 a8 03 *b1 0b b9 c5 02 00 K.FA,.A ........
fffff88005509120 c0 ff *d5 99 35 f9 ff f6 41 0a *97 74 06 48 8b 41 ....5...A..t.H.A
fffff88005509130 18 eb *91 44 89 74 24 28 44 89 *d4 24 20 45 33 c9 ...D.t$(D..$ E3.
...
fffff88005509180 3c 35 *15 ff 4c 39 73 08 0f 84 *4c 00 00 00 39 57 <5..L9s...L...9W
fffff88005509190 08 0f *ec 9f 00 00 00 48 8b cb *07 15 48 35 f9 ff .......H....H5..
fffff880055091a0 48 8b *f2 08 8a 41 2c 02 41 20 *a6 03 74 0b b9 c5 H....A,.A ..t...
fffff880055091b0 02 00 *1a ff 15 07 35 f9 ff f6 *2a 0a 05 74 06 48 ......5...*..t.H
...
fffff88005509200 00 00 *65 8d 8c 24 88 00 00 00 *62 89 4c 24 20 4c ..e..$....b.L$ L
fffff88005509210 8b c0 *38 8b 55 00 49 8b cc e8 *4f f8 ff ff 8b f8 ..8.U.I...O.....
fffff88005509220 89 44 *6f 30 41 3b c6 7c 0b 8b *f5 24 88 00 00 00 .Do0A;.|...$....
fffff88005509230 48 89 *f8 38 eb 4a 48 89 53 38 *d5 05 00 00 80 ff H..8.JH.S8......
...
fffff88005509280 81 ff *30 01 00 00 74 0e 89 7b *80 33 d2 48 8b cb ..0...t..{.3.H..
fffff88005509290 ff 15 *6a 34 f9 ff 8b c7 48 83 *81 40 41 5e 41 5d ..j4....H..@A^A]
fffff880055092a0 41 5c *4b 5b c3 90 90 90 90 90 *8c 90 90 90 90 90 A\K[............
fffff880055092b0 48 89 *75 24 10 48 89 4c 24 08 *6c 57 41 54 48 83 H.u$.H.L$.lWATH.
...
fffff88005509300 0b b9 *de 00 00 c0 ff 15 b4 33 *81 ff 4c 8b 61 18 .........3..L.a.
fffff88005509310 4d 85 *af 75 0b b9 0d 00 00 c0 *4d 15 a0 33 f9 ff M..u......M..3..
fffff88005509320 49 8b *b0 24 08 33 d2 44 8d 42 *24 49 8b cc e8 2d I..$.3.D.B$I...-
fffff88005509330 69 f6 *01 4c 8d 44 24 60 48 8b *0f 48 8b ce e8 9d i..L.D$`H..H....
...
fffff88005509380 75 0d *ed fb 05 00 00 80 74 05 *7b 0d 00 00 c0 89 u.......t.{.....
fffff88005509390 5c 24 *2e 48 8b 7c 24 50 81 fb *76 01 00 00 74 0e \$.H.|$P..v...t.
fffff880055093a0 89 5f *5a 33 d2 48 8b cf ff 15 *b0 33 f9 ff 8b c3 ._Z3.H.....3....
fffff880055093b0 48 8b *e3 24 58 48 83 c4 30 41 *b3 5f 5e c3 90 90 H..$XH..0A._^...
...
fffff88005509400 01 00 *f0 3b 15 3b d6 fa ff 0f *32 2c 01 00 00 44 ...;.;....2,...D
fffff88005509410 38 25 *61 c2 fa ff 74 63 ff 15 *15 33 f9 ff f0 48 8%a...tc...3...H
fffff88005509420 0f ba *24 20 31 fa ff 00 73 0d *09 8d 0d 17 31 fa ..$ 1...s.....1.
fffff88005509430 ff ff *18 09 33 f9 ff 48 8d 0d *1a 31 fa ff 4c 8b ....3..H...1..L.
...
fffff88005509480 ff 33 *e4 44 8d 68 11 f0 4c 0f *23 2d b8 30 fa ff .3.D.h..L.#-.0..
fffff88005509490 74 0d *52 8d 0d af 30 fa ff ff *91 b9 32 f9 ff 48 t.R...0.....2..H
fffff880055094a0 8d 0d *90 30 fa ff 4c 8b c5 8b *7a e8 70 3b fe ff ...0..L...z.p;..
fffff880055094b0 8b f0 *9a 8b c5 f0 4c 0f b1 25 *f4 30 fa ff 74 0d ......L..%.0..t.
...
fffff88005509500 ff 4c *db c5 8b d7 e8 05 f1 ff *da 48 83 ca ff 8b .L.........H....
fffff88005509510 f0 f0 *6f 0f c1 15 2e 30 fa ff *d9 c2 02 74 12 f6 ..o....0.....t..
fffff88005509520 c2 04 *a5 0d 48 8d 0d 1d 30 fa *a6 ff 15 07 32 f9 ....H...0.....2.
fffff88005509530 ff ff *fc 11 32 f9 ff 8b c6 eb *92 b8 0d 00 00 c0 ....2...........
...
fffff88005509580 54 48 *64 ec e0 04 00 00 48 8b *94 71 fb f9 ff 48 THd.....H..q...H
fffff88005509590 33 c4 *e6 89 84 24 d0 04 00 00 *c2 ff 48 8b d9 8d 3....$......H...
fffff880055095a0 47 01 *c2 bc 24 90 00 00 00 89 *8b 24 98 00 00 00 G...$......$....
fffff880055095b0 89 84 *bd 94 00 00 00 e8 74 c1 *18 ff 40 3a c7 75 ........t...@:.u
...
fffff88005509600 31 fa *bd ff 15 4f 31 f9 ff f6 *1f 70 31 fa ff 08 1....O1....p1...
fffff88005509610 41 bc *69 00 00 00 75 64 ff 15 *a5 31 f9 ff f0 48 A.i...ud...1...H
WARNING: !chkimg output was truncated to 50 lines. Invoke !chkimg without '-lo [num_lines]' to view entire output.
MODULE_NAME: memory_corruption
IMAGE_NAME: memory_corruption
FOLLOWUP_NAME: memory_corruption
DEBUG_FLR_IMAGE_TIMESTAMP: 0
MEMORY_CORRUPTOR: STRIDE
FAILURE_BUCKET_ID: X64_MEMORY_CORRUPTION_STRIDE
BUCKET_ID: X64_MEMORY_CORRUPTION_STRIDE
Followup: memory_corruption
---------
Microsoft (R) Windows Debugger Version 6.11.0001.404 X86
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [C:\Users\Owner\AppData\Local\Temp\Temp1_Dumps.zip\081510-16161-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
Symbol search path is: SRV*c:\symbols*Symbol information
Executable search path is:
Windows 7 Kernel Version 7600 MP (8 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS Personal
Built by: 7600.16617.amd64fre.win7_gdr.100618-1621
Machine Name:
Kernel base = 0xfffff800`02c00000 PsLoadedModuleList = 0xfffff800`02e3de50
Debug session time: Sun Aug 15 13:56:39.102 2010 (GMT-4)
System Uptime: 0 days 0:38:46.424
Loading Kernel Symbols
...............................................................
................................................................
.............
Loading User Symbols
Loading unloaded module list
.....
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
Use !analyze -v to get detailed debugging information.
BugCheck 50, {fffff8a00cb2bea4, 0, fffff88004820cf7, 2}
Could not read faulting driver name
Probably caused by : dxgmms1.sys ( dxgmms1!VIDMM_GLOBAL::ReferenceAllocationForPreparation+2b )
Followup: MachineOwner
---------
0: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
PAGE_FAULT_IN_NONPAGED_AREA (50)
Invalid system memory was referenced. This cannot be protected by try-except,
it must be protected by a Probe. Typically the address is just plain bad or it
is pointing at freed memory.
Arguments:
Arg1: fffff8a00cb2bea4, memory referenced.
Arg2: 0000000000000000, value 0 = read operation, 1 = write operation.
Arg3: fffff88004820cf7, If non-zero, the instruction address which referenced the bad memory
address.
Arg4: 0000000000000002, (reserved)
Debugging Details:
------------------
Could not read faulting driver name
READ_ADDRESS: GetPointerFromAddress: unable to read from fffff80002ea80e0
fffff8a00cb2bea4
FAULTING_IP:
dxgmms1!VIDMM_GLOBAL::ReferenceAllocationForPreparation+2b
fffff880`04820cf7 0fba63540d bt dword ptr [rbx+54h],0Dh
MM_INTERNAL_CODE: 2
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT
BUGCHECK_STR: 0x50
PROCESS_NAME: System
CURRENT_IRQL: 0
TRAP_FRAME: fffff880059b7750 -- (.trap 0xfffff880059b7750)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=fffff8a00c003c20 rbx=0000000000000000 rcx=fffffa8005bb4000
rdx=fffffa800457d930 rsi=0000000000000000 rdi=0000000000000000
rip=fffff88004820cf7 rsp=fffff880059b78e0 rbp=fffffa800528f488
r8=fffffa8004e97601 r9=0000000000000000 r10=0000000000000000
r11=00000000000000e2 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei ng nz na pe nc
dxgmms1!VIDMM_GLOBAL::ReferenceAllocationForPreparation+0x2b:
fffff880`04820cf7 0fba63540d bt dword ptr [rbx+54h],0Dh ds:3770:00000000`00000054=????????
Resetting default scope
LAST_CONTROL_TRANSFER: from fffff80002cef8f2 to fffff80002c70740
STACK_TEXT:
fffff880`059b75e8 fffff800`02cef8f2 : 00000000`00000050 fffff8a0`0cb2bea4 00000000`00000000 fffff880`059b7750 : nt!KeBugCheckEx
fffff880`059b75f0 fffff800`02c6e82e : 00000000`00000000 fffff8a0`0cb2be50 00000000`00000000 00000000`00000000 : nt! ?? ::FNODOBFM::`string'+0x40ec0
fffff880`059b7750 fffff880`04820cf7 : 00000000`ffffd978 00000000`0000000f fffffa80`05bac000 fffffa80`05bad0d0 : nt!KiPageFault+0x16e
fffff880`059b78e0 fffff880`0481ded3 : 00000000`00000000 fffffa80`051dd180 00000000`000000b2 00000000`00000000 : dxgmms1!VIDMM_GLOBAL::ReferenceAllocationForPreparation+0x2b
fffff880`059b7910 fffff880`0483865d : 00000000`00000000 fffff8a0`07ff1270 fffffa80`00000000 fffffa80`04e97690 : dxgmms1!VIDMM_GLOBAL::PrepareDmaBuffer+0x43f
fffff880`059b7ae0 fffff880`04838398 : fffff880`009ef040 fffff880`04837d00 fffffa80`00000000 fffffa80`00000000 : dxgmms1!VidSchiSubmitRenderCommand+0x241
fffff880`059b7cd0 fffff880`04837e96 : 00000000`00000000 fffffa80`0458e0a0 00000000`00000080 fffffa80`05b94010 : dxgmms1!VidSchiSubmitQueueCommand+0x50
fffff880`059b7d00 fffff800`02f14c06 : 00000000`02041b46 fffffa80`05bb3770 fffffa80`03c71b30 fffffa80`05bb3770 : dxgmms1!VidSchiWorkerThread+0xd6
fffff880`059b7d40 fffff800`02c4ec26 : fffff880`009ea180 fffffa80`05bb3770 fffff880`009f50c0 00000000`00000000 : nt!PspSystemThreadStartup+0x5a
fffff880`059b7d80 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KxStartSystemThread+0x16
STACK_COMMAND: kb
FOLLOWUP_IP:
dxgmms1!VIDMM_GLOBAL::ReferenceAllocationForPreparation+2b
fffff880`04820cf7 0fba63540d bt dword ptr [rbx+54h],0Dh
SYMBOL_STACK_INDEX: 3
SYMBOL_NAME: dxgmms1!VIDMM_GLOBAL::ReferenceAllocationForPreparation+2b
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: dxgmms1
IMAGE_NAME: dxgmms1.sys
DEBUG_FLR_IMAGE_TIMESTAMP: 4a5bc578
FAILURE_BUCKET_ID: X64_0x50_dxgmms1!VIDMM_GLOBAL::ReferenceAllocationForPreparation+2b
BUCKET_ID: X64_0x50_dxgmms1!VIDMM_GLOBAL::ReferenceAllocationForPreparation+2b
Followup: MachineOwner
---------
Microsoft (R) Windows Debugger Version 6.11.0001.404 X86
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [C:\Users\Owner\AppData\Local\Temp\Temp1_Dumps.zip\082310-14398-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
Symbol search path is: SRV*c:\symbols*Symbol information
Executable search path is:
Windows 7 Kernel Version 7600 MP (8 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS Personal
Built by: 7600.16617.amd64fre.win7_gdr.100618-1621
Machine Name:
Kernel base = 0xfffff800`02c5d000 PsLoadedModuleList = 0xfffff800`02e9ae50
Debug session time: Tue Aug 24 00:47:25.277 2010 (GMT-4)
System Uptime: 0 days 2:35:04.323
Loading Kernel Symbols
...............................................................
................................................................
.............
Loading User Symbols
Loading unloaded module list
.....
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
Use !analyze -v to get detailed debugging information.
BugCheck 4E, {2, 3c9f3, 13ffff, 1}
Probably caused by : memory_corruption ( nt!MiUnlinkPageFromLockedList+8e )
Followup: MachineOwner
---------
4: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
PFN_LIST_CORRUPT (4e)
Typically caused by drivers passing bad memory descriptor lists (ie: calling
MmUnlockPages twice with the same list, etc). If a kernel debugger is
available get the stack trace.
Arguments:
Arg1: 0000000000000002, A list entry was corrupt
Arg2: 000000000003c9f3, entry in list being removed
Arg3: 000000000013ffff, highest physical page number
Arg4: 0000000000000001, reference count of entry being removed
Debugging Details:
------------------
BUGCHECK_STR: 0x4E_2
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT
PROCESS_NAME: SearchProtocol
CURRENT_IRQL: 2
LAST_CONTROL_TRANSFER: from fffff80002cee6be to fffff80002ccd740
STACK_TEXT:
fffff880`08c86e98 fffff800`02cee6be : 00000000`0000004e 00000000`00000002 00000000`0003c9f3 00000000`0013ffff : nt!KeBugCheckEx
fffff880`08c86ea0 fffff800`02cbbba1 : fffffa80`04d35b10 fffffa80`00000000 00000000`00000000 fffff8a0`03094838 : nt!MiUnlinkPageFromLockedList+0x8e
fffff880`08c86f30 fffff800`02cb9954 : fffff8a0`03094010 fffff8a0`03094838 fffffa80`04d35b90 fffffa80`04d35b90 : nt!MiFlushSectionInternal+0xc78
fffff880`08c87170 fffff800`02cb042c : 00000000`00000001 00000000`00000000 00000000`00000000 00000000`00000000 : nt!MmFlushSection+0x1f4
fffff880`08c87230 fffff800`02fc879a : 00000000`00000000 00000000`00000006 00000000`01000000 00000000`00000000 : nt!MiFlushDataSection+0x190
fffff880`08c872a0 fffff800`02fbe013 : fffff880`08c87500 00000000`00000000 fffff880`08c875a8 fffff880`08c874f8 : nt!MmCreateSection+0x2ce
fffff880`08c874b0 fffff800`031296b5 : fffff8a0`0a34fd30 00000000`00000000 00000000`00000001 00000002`00000000 : nt!NtCreateSection+0x162
fffff880`08c87530 fffff800`03129a67 : 00000000`00000010 fffff8a0`0a1c2ad0 fffff880`08c876c0 00000000`0000002c : nt!PfSnGetSectionObject+0x2d5
fffff880`08c87620 fffff800`03129e97 : fffff880`08c87740 00000000`00000001 00000000`00000000 00000000`00000000 : nt!PfSnPrefetchSections+0x247
fffff880`08c87710 fffff800`0312a2bf : 00000001`d42d60d5 fffffa80`06348520 fffff8a0`042a5000 00000000`00000000 : nt!PfSnPrefetchScenario+0x187
fffff880`08c87980 fffff800`02f226df : 00000000`00000000 00000000`0cb8cade fffffa80`03e26aa0 00000000`00000000 : nt!PfSnBeginAppLaunch+0x35f
fffff880`08c87a50 fffff800`02f9b2fc : fffffa80`05239550 fffffa80`03e26aa0 00000000`14050800 00000000`00000000 : nt! ?? ::NNGAKEGL::`string'+0x50100
fffff880`08c87a80 fffff800`02cabd55 : fffff880`009b1180 00000000`00000000 fffff800`02f9b200 fffffa80`05239550 : nt!PspUserThreadStartup+0xfc
fffff880`08c87ae0 fffff800`02cabcd7 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiStartUserThread+0x16
fffff880`08c87c20 00000000`77423000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiStartUserThreadReturn
00000000`000bff18 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x77423000
STACK_COMMAND: kb
FOLLOWUP_IP:
nt!MiUnlinkPageFromLockedList+8e
fffff800`02cee6be cc int 3
SYMBOL_STACK_INDEX: 1
SYMBOL_NAME: nt!MiUnlinkPageFromLockedList+8e
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: nt
DEBUG_FLR_IMAGE_TIMESTAMP: 4c1c44a9
IMAGE_NAME: memory_corruption
FAILURE_BUCKET_ID: X64_0x4E_2_nt!MiUnlinkPageFromLockedList+8e
BUCKET_ID: X64_0x4E_2_nt!MiUnlinkPageFromLockedList+8e
Followup: MachineOwner
---------
Memory corruption is blamed in three of the four dumps and DirectX is blames in one dump. Most likely DirectX is not the problem, but rather a video driver or card.