Code:
-
Loading Dump File [C:\Users\Mike\Downloads\BSODDmpFiles\AlidaV\Windows_NT6_BSOD_jcgriff2\011712-12324-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
Symbol search path is: SRV*c:\users\mike\documents\symbols*http://msdl.microsoft.com/download/symbols
Executable search path is:
Windows 7 Kernel Version 7601 (Service Pack 1) MP (4 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS Personal
Built by: 7601.17640.amd64fre.win7sp1_gdr.110622-1506
Machine Name:
Kernel base = 0xfffff800`02c4c000 PsLoadedModuleList = 0xfffff800`02e91670
Debug session time: Tue Jan 17 19:20:26.560 2012 (UTC - 7:00)
System Uptime: 1 days 15:04:25.793
Loading Kernel Symbols
...............................................................
................................................................
................
Loading User Symbols
Loading unloaded module list
.........................
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
Use !analyze -v to get detailed debugging information.
BugCheck 50, {fffffa801906b048, 0, fffff88001409a5f, 2}
Unable to load image \SystemRoot\system32\DRIVERS\atikmpag.sys, Win32 error 0n2
*** WARNING: Unable to verify timestamp for atikmpag.sys
*** ERROR: Module load completed but symbols could not be loaded for atikmpag.sys
Could not read faulting driver name
Probably caused by : atikmpag.sys ( atikmpag+9a5f )
Followup: MachineOwner
---------
3: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
PAGE_FAULT_IN_NONPAGED_AREA (50)
Invalid system memory was referenced. This cannot be protected by try-except,
it must be protected by a Probe. Typically the address is just plain bad or it
is pointing at freed memory.
Arguments:
Arg1: fffffa801906b048, memory referenced.
Arg2: 0000000000000000, value 0 = read operation, 1 = write operation.
Arg3: fffff88001409a5f, If non-zero, the instruction address which referenced the bad memory
address.
Arg4: 0000000000000002, (reserved)
Debugging Details:
------------------
Could not read faulting driver name
READ_ADDRESS: GetPointerFromAddress: unable to read from fffff80002efb100
fffffa801906b048
FAULTING_IP:
atikmpag+9a5f
fffff880`01409a5f 488b4008 mov rax,qword ptr [rax+8]
MM_INTERNAL_CODE: 2
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT
BUGCHECK_STR: 0x50
PROCESS_NAME: Wow.exe
CURRENT_IRQL: 0
TRAP_FRAME: fffff8800b156ff0 -- (.trap 0xfffff8800b156ff0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=fffffa801906b040 rbx=0000000000000000 rcx=fffffa800d13b000
rdx=ffffffffffe30000 rsi=0000000000000000 rdi=0000000000000000
rip=fffff88001409a5f rsp=fffff8800b157180 rbp=fffffa800d13b000
r8=0000000000000000 r9=0000000000000000 r10=0000000000000000
r11=fffffa800d13b000 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei ng nz na pe nc
atikmpag+0x9a5f:
fffff880`01409a5f 488b4008 mov rax,qword ptr [rax+8] ds:bb00:fffffa80`1906b048=????????????????
Resetting default scope
LAST_CONTROL_TRANSFER: from fffff80002c733f0 to fffff80002cc8c40
STACK_TEXT:
fffff880`0b156e88 fffff800`02c733f0 : 00000000`00000050 fffffa80`1906b048 00000000`00000000 fffff880`0b156ff0 : nt!KeBugCheckEx
fffff880`0b156e90 fffff800`02cc6d6e : 00000000`00000000 fffffa80`1906b048 fffffa80`0d13b000 fffff880`0b157240 : nt! ?? ::FNODOBFM::`string'+0x447c6
fffff880`0b156ff0 fffff880`01409a5f : fffff8a0`1891f8f0 fffff880`0b157240 00000000`00010d42 00000000`00000000 : nt!KiPageFault+0x16e
fffff880`0b157180 fffff8a0`1891f8f0 : fffff880`0b157240 00000000`00010d42 00000000`00000000 ffffffff`c000000d : atikmpag+0x9a5f
fffff880`0b157188 fffff880`0b157240 : 00000000`00010d42 00000000`00000000 ffffffff`c000000d 00000000`00000001 : 0xfffff8a0`1891f8f0
fffff880`0b157190 00000000`00010d42 : 00000000`00000000 ffffffff`c000000d 00000000`00000001 fffffa80`0cf6b000 : 0xfffff880`0b157240
fffff880`0b157198 00000000`00000000 : ffffffff`c000000d 00000000`00000001 fffffa80`0cf6b000 fffffa80`0a626040 : 0x10d42
STACK_COMMAND: kb
FOLLOWUP_IP:
atikmpag+9a5f
fffff880`01409a5f 488b4008 mov rax,qword ptr [rax+8]
SYMBOL_STACK_INDEX: 3
SYMBOL_NAME: atikmpag+9a5f
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: atikmpag
IMAGE_NAME: atikmpag.sys
DEBUG_FLR_IMAGE_TIMESTAMP: 4ca29309
FAILURE_BUCKET_ID: X64_0x50_atikmpag+9a5f
BUCKET_ID: X64_0x50_atikmpag+9a5f
Followup: MachineOwner
---------
-
Loading Dump File [C:\Users\Mike\Downloads\BSODDmpFiles\AlidaV\Windows_NT6_BSOD_jcgriff2\011712-17768-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
Symbol search path is: SRV*c:\users\mike\documents\symbols*http://msdl.microsoft.com/download/symbols
Executable search path is:
Windows 7 Kernel Version 7601 (Service Pack 1) MP (4 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS Personal
Built by: 7601.17640.amd64fre.win7sp1_gdr.110622-1506
Machine Name:
Kernel base = 0xfffff800`02c5b000 PsLoadedModuleList = 0xfffff800`02ea0670
Debug session time: Tue Jan 17 19:36:12.666 2012 (UTC - 7:00)
System Uptime: 0 days 0:15:09.899
Loading Kernel Symbols
...............................................................
................................................................
................
Loading User Symbols
Loading unloaded module list
....
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
Use !analyze -v to get detailed debugging information.
BugCheck 50, {fffff8a08b2031e8, 0, fffff8800541d135, 5}
Could not read faulting driver name
Probably caused by : dxgmms1.sys ( dxgmms1!VIDMM_GLOBAL::ReferenceDmaBuffer+1e5 )
Followup: MachineOwner
---------
3: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
PAGE_FAULT_IN_NONPAGED_AREA (50)
Invalid system memory was referenced. This cannot be protected by try-except,
it must be protected by a Probe. Typically the address is just plain bad or it
is pointing at freed memory.
Arguments:
Arg1: fffff8a08b2031e8, memory referenced.
Arg2: 0000000000000000, value 0 = read operation, 1 = write operation.
Arg3: fffff8800541d135, If non-zero, the instruction address which referenced the bad memory
address.
Arg4: 0000000000000005, (reserved)
Debugging Details:
------------------
Could not read faulting driver name
READ_ADDRESS: GetPointerFromAddress: unable to read from fffff80002f0a100
fffff8a08b2031e8
FAULTING_IP:
dxgmms1!VIDMM_GLOBAL::ReferenceDmaBuffer+1e5
fffff880`0541d135 48395f18 cmp qword ptr [rdi+18h],rbx
MM_INTERNAL_CODE: 5
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT
BUGCHECK_STR: 0x50
PROCESS_NAME: Wow.exe
CURRENT_IRQL: 0
TRAP_FRAME: fffff8800a468f60 -- (.trap 0xfffff8800a468f60)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000005 rbx=0000000000000000 rcx=0000000000000154
rdx=fffff8a011bd6000 rsi=0000000000000000 rdi=0000000000000000
rip=fffff8800541d135 rsp=fffff8800a4690f0 rbp=fffff8800a469900
r8=fffffa80074c64e8 r9=0000000000000002 r10=00000000f4dbd025
r11=0000000080005500 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei ng nz na pe nc
dxgmms1!VIDMM_GLOBAL::ReferenceDmaBuffer+0x1e5:
fffff880`0541d135 48395f18 cmp qword ptr [rdi+18h],rbx ds:8400:00000000`00000018=????????????????
Resetting default scope
LAST_CONTROL_TRANSFER: from fffff80002c823bf to fffff80002cd7c40
STACK_TEXT:
fffff880`0a468df8 fffff800`02c823bf : 00000000`00000050 fffff8a0`8b2031e8 00000000`00000000 fffff880`0a468f60 : nt!KeBugCheckEx
fffff880`0a468e00 fffff800`02cd5d6e : 00000000`00000000 fffff8a0`8b2031e8 00000000`00000000 00000000`00000000 : nt! ?? ::FNODOBFM::`string'+0x44791
fffff880`0a468f60 fffff880`0541d135 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiPageFault+0x16e
fffff880`0a4690f0 fffff880`054033e7 : fffffa80`06dda301 fffffa80`072b2f10 00000000`03ae04e8 fffff880`000000fd : dxgmms1!VIDMM_GLOBAL::ReferenceDmaBuffer+0x1e5
fffff880`0a4691e0 fffff880`05552fae : fffff880`0a469260 00000000`00000200 fffff880`0a469900 00000000`00000000 : dxgmms1!VidMmReferenceDmaBuffer+0x43
fffff880`0a469230 fffff880`05552773 : fffff8a0`00000001 fffff8a0`0e6a5f10 fffff880`0a4698b0 00000000`00000003 : dxgkrnl!DXGCONTEXT::Render+0x326
fffff880`0a469840 fffff960`001bf80e : 00000000`0656e4e0 fffff880`00000200 00000000`fff29000 00000000`00000000 : dxgkrnl!DxgkRender+0x3e7
fffff880`0a469ab0 fffff800`02cd6ed3 : fffffa80`0b773b60 fffff880`0a469b60 00000000`00000000 fffffa80`0b429800 : win32k!NtGdiDdDDIRender+0x12
fffff880`0a469ae0 00000000`7311164a : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x13
00000000`0656e4b8 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x7311164a
STACK_COMMAND: kb
FOLLOWUP_IP:
dxgmms1!VIDMM_GLOBAL::ReferenceDmaBuffer+1e5
fffff880`0541d135 48395f18 cmp qword ptr [rdi+18h],rbx
SYMBOL_STACK_INDEX: 3
SYMBOL_NAME: dxgmms1!VIDMM_GLOBAL::ReferenceDmaBuffer+1e5
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: dxgmms1
IMAGE_NAME: dxgmms1.sys
DEBUG_FLR_IMAGE_TIMESTAMP: 4ce799c1
FAILURE_BUCKET_ID: X64_0x50_dxgmms1!VIDMM_GLOBAL::ReferenceDmaBuffer+1e5
BUCKET_ID: X64_0x50_dxgmms1!VIDMM_GLOBAL::ReferenceDmaBuffer+1e5
Followup: MachineOwner
---------
-
Loading Dump File [C:\Users\Mike\Downloads\BSODDmpFiles\AlidaV\Windows_NT6_BSOD_jcgriff2\011712-15334-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
Symbol search path is: SRV*c:\users\mike\documents\symbols*http://msdl.microsoft.com/download/symbols
Executable search path is:
Windows 7 Kernel Version 7601 (Service Pack 1) MP (4 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS Personal
Built by: 7601.17640.amd64fre.win7sp1_gdr.110622-1506
Machine Name:
Kernel base = 0xfffff800`02c08000 PsLoadedModuleList = 0xfffff800`02e4d670
Debug session time: Tue Jan 17 20:22:39.842 2012 (UTC - 7:00)
System Uptime: 0 days 0:02:01.685
Loading Kernel Symbols
...............................................................
................................................................
................
Loading User Symbols
Loading unloaded module list
...
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
Use !analyze -v to get detailed debugging information.
BugCheck 50, {fffff80000c7c93c, 8, fffff80000c7c93c, 2}
Could not read faulting driver name
Probably caused by : ntkrnlmp.exe ( nt! ?? ::FNODOBFM::`string'+447c6 )
Followup: MachineOwner
---------
1: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
PAGE_FAULT_IN_NONPAGED_AREA (50)
Invalid system memory was referenced. This cannot be protected by try-except,
it must be protected by a Probe. Typically the address is just plain bad or it
is pointing at freed memory.
Arguments:
Arg1: fffff80000c7c93c, memory referenced.
Arg2: 0000000000000008, value 0 = read operation, 1 = write operation.
Arg3: fffff80000c7c93c, If non-zero, the instruction address which referenced the bad memory
address.
Arg4: 0000000000000002, (reserved)
Debugging Details:
------------------
Could not read faulting driver name
WRITE_ADDRESS: GetPointerFromAddress: unable to read from fffff80002eb7100
fffff80000c7c93c
FAULTING_IP:
+6438396639323130
fffff800`00c7c93c ?? ???
MM_INTERNAL_CODE: 2
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT
BUGCHECK_STR: 0x50
PROCESS_NAME: System
CURRENT_IRQL: 0
TRAP_FRAME: fffff8800331bab0 -- (.trap 0xfffff8800331bab0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000000 rbx=0000000000000000 rcx=fffff880009ea180
rdx=0000000000000000 rsi=0000000000000000 rdi=0000000000000000
rip=fffff80000c7c93c rsp=fffff8800331bc40 rbp=0000000012000000
r8=0000000000000000 r9=0000000000000000 r10=0000000000000000
r11=000000000002599b r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up di ng nz na po nc
fffff800`00c7c93c ?? ???
Resetting default scope
LAST_CONTROL_TRANSFER: from fffff80002c2f3f0 to fffff80002c84c40
STACK_TEXT:
fffff880`0331b948 fffff800`02c2f3f0 : 00000000`00000050 fffff800`00c7c93c 00000000`00000008 fffff880`0331bab0 : nt!KeBugCheckEx
fffff880`0331b950 fffff800`02c82d6e : 00000000`00000008 fffff800`00c7c93c fffffa80`0b00cb00 fffff880`009ea180 : nt! ?? ::FNODOBFM::`string'+0x447c6
fffff880`0331bab0 fffff800`00c7c93c : fffff880`009ea180 fffff880`00000002 00000000`00000002 fffff800`00000000 : nt!KiPageFault+0x16e
fffff880`0331bc40 fffff880`009ea180 : fffff880`00000002 00000000`00000002 fffff800`00000000 fffff880`0331bc70 : 0xfffff800`00c7c93c
fffff880`0331bc48 fffff880`00000002 : 00000000`00000002 fffff800`00000000 fffff880`0331bc70 00000000`00000000 : 0xfffff880`009ea180
fffff880`0331bc50 00000000`00000002 : fffff800`00000000 fffff880`0331bc70 00000000`00000000 00000000`00000000 : 0xfffff880`00000002
fffff880`0331bc58 fffff800`00000000 : fffff880`0331bc70 00000000`00000000 00000000`00000000 00000000`00000000 : 0x2
fffff880`0331bc60 fffff880`0331bc70 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0xfffff800`00000000
fffff880`0331bc68 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0xfffff880`0331bc70
STACK_COMMAND: kb
FOLLOWUP_IP:
nt! ?? ::FNODOBFM::`string'+447c6
fffff800`02c2f3f0 cc int 3
SYMBOL_STACK_INDEX: 1
SYMBOL_NAME: nt! ?? ::FNODOBFM::`string'+447c6
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: nt
IMAGE_NAME: ntkrnlmp.exe
DEBUG_FLR_IMAGE_TIMESTAMP: 4e02aaa3
FAILURE_BUCKET_ID: X64_0x50_nt!_??_::FNODOBFM::_string_+447c6
BUCKET_ID: X64_0x50_nt!_??_::FNODOBFM::_string_+447c6
Followup: MachineOwner
---------
-
Loading Dump File [C:\Users\Mike\Downloads\BSODDmpFiles\AlidaV\Windows_NT6_BSOD_jcgriff2\011712-11029-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
Symbol search path is: SRV*c:\users\mike\documents\symbols*http://msdl.microsoft.com/download/symbols
Executable search path is:
Windows 7 Kernel Version 7601 (Service Pack 1) MP (4 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS Personal
Built by: 7601.17640.amd64fre.win7sp1_gdr.110622-1506
Machine Name:
Kernel base = 0xfffff800`02c1a000 PsLoadedModuleList = 0xfffff800`02e5f670
Debug session time: Tue Jan 17 21:17:42.850 2012 (UTC - 7:00)
System Uptime: 0 days 0:48:44.083
Loading Kernel Symbols
...............................................................
................................................................
................
Loading User Symbols
Loading unloaded module list
....
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
Use !analyze -v to get detailed debugging information.
BugCheck A, {18, 2, 0, fffff80002d42077}
Probably caused by : memory_corruption ( nt!MiIdentifyPfn+317 )
Followup: MachineOwner
---------
1: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
IRQL_NOT_LESS_OR_EQUAL (a)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high. This is usually
caused by drivers using improper addresses.
If a kernel debugger is available get the stack backtrace.
Arguments:
Arg1: 0000000000000018, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000000, bitfield :
bit 0 : value 0 = read operation, 1 = write operation
bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
Arg4: fffff80002d42077, address which referenced memory
Debugging Details:
------------------
READ_ADDRESS: GetPointerFromAddress: unable to read from fffff80002ec9100
0000000000000018
CURRENT_IRQL: 2
FAULTING_IP:
nt!MiIdentifyPfn+317
fffff800`02d42077 488b4118 mov rax,qword ptr [rcx+18h]
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT
BUGCHECK_STR: 0xA
PROCESS_NAME: svchost.exe
TRAP_FRAME: fffff880066ec3a0 -- (.trap 0xfffff880066ec3a0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000001 rbx=0000000000000000 rcx=0000000000000000
rdx=000000000007c555 rsi=0000000000000000 rdi=0000000000000000
rip=fffff80002d42077 rsp=fffff880066ec530 rbp=fffffa800c30e100
r8=000000000013df57 r9=0000000000000001 r10=0000000000000042
r11=0000058000000000 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei pl zr na po nc
nt!MiIdentifyPfn+0x317:
fffff800`02d42077 488b4118 mov rax,qword ptr [rcx+18h] ds:00000000`00000018=????????????????
Resetting default scope
LAST_CONTROL_TRANSFER: from fffff80002c961e9 to fffff80002c96c40
STACK_TEXT:
fffff880`066ec258 fffff800`02c961e9 : 00000000`0000000a 00000000`00000018 00000000`00000002 00000000`00000000 : nt!KeBugCheckEx
fffff880`066ec260 fffff800`02c94e60 : 00000000`42506650 00000000`00000000 00000000`00000000 02000000`9220c4cb : nt!KiBugCheckDispatch+0x69
fffff880`066ec3a0 fffff800`02d42077 : 00000000`00000000 02000000`0005c96f 00000000`42506600 fffff800`02f8273f : nt!KiPageFault+0x260
fffff880`066ec530 fffff800`02d42c7b : 00000000`00000000 00000000`00000004 fffffa80`11f6a750 fffffa80`11f69000 : nt!MiIdentifyPfn+0x317
fffff880`066ec5d0 fffff800`030a77e5 : fffffa80`11f69000 fffff880`066ecb60 fffff880`066ec6a8 00000000`00000000 : nt!MmQueryPfnList+0xbb
fffff880`066ec610 fffff800`02fea4c8 : 00000000`00000006 00000000`00000000 fffffa80`11f69000 00000000`00000001 : nt!PfpPfnPrioRequest+0x115
fffff880`066ec660 fffff800`02fa0bd3 : 00000000`00000000 00000000`00000000 00000000`00000001 fffff880`066ec701 : nt! ?? ::NNGAKEGL::`string'+0x4810d
fffff880`066ec6f0 fffff800`02fa1449 : 00000000`0132b6e8 fffff800`02ca2f58 00000000`0132b740 00000000`ffffffff : nt!ExpQuerySystemInformation+0x1193
fffff880`066ecaa0 fffff800`02c95ed3 : 00000000`01f1f938 fffff880`066ecb60 00000000`01f56290 00000000`02aaf800 : nt!NtQuerySystemInformation+0x4d
fffff880`066ecae0 00000000`772c167a : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x13
00000000`0132b608 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x772c167a
STACK_COMMAND: kb
FOLLOWUP_IP:
nt!MiIdentifyPfn+317
fffff800`02d42077 488b4118 mov rax,qword ptr [rcx+18h]
SYMBOL_STACK_INDEX: 3
SYMBOL_NAME: nt!MiIdentifyPfn+317
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: nt
DEBUG_FLR_IMAGE_TIMESTAMP: 4e02aaa3
IMAGE_NAME: memory_corruption
FAILURE_BUCKET_ID: X64_0xA_nt!MiIdentifyPfn+317
BUCKET_ID: X64_0xA_nt!MiIdentifyPfn+317
Followup: MachineOwner
---------
-
Loading Dump File [C:\Users\Mike\Downloads\BSODDmpFiles\AlidaV\Windows_NT6_BSOD_jcgriff2\011712-16598-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
Symbol search path is: SRV*c:\users\mike\documents\symbols*http://msdl.microsoft.com/download/symbols
Executable search path is:
Windows 7 Kernel Version 7601 (Service Pack 1) MP (4 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS Personal
Built by: 7601.17640.amd64fre.win7sp1_gdr.110622-1506
Machine Name:
Kernel base = 0xfffff800`02c5e000 PsLoadedModuleList = 0xfffff800`02ea3670
Debug session time: Tue Jan 17 22:41:30.221 2012 (UTC - 7:00)
System Uptime: 0 days 0:56:20.454
Loading Kernel Symbols
...............................................................
................................................................
...............
Loading User Symbols
Loading unloaded module list
....
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
Use !analyze -v to get detailed debugging information.
BugCheck 1000007E, {ffffffffc000001d, fffff880030b7dc8, fffff880065bb308, fffff880065bab60}
Probably caused by : dxgkrnl.sys ( dxgkrnl!DxgkCddGdiCommand+0 )
Followup: MachineOwner
---------
3: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
SYSTEM_THREAD_EXCEPTION_NOT_HANDLED_M (1000007e)
This is a very common bugcheck. Usually the exception address pinpoints
the driver/function that caused the problem. Always note this address
as well as the link date of the driver/image that contains this address.
Some common problems are exception code 0x80000003. This means a hard
coded breakpoint or assertion was hit, but this system was booted
/NODEBUG. This is not supposed to happen as developers should never have
hardcoded breakpoints in retail code, but ...
If this happens, make sure a debugger gets connected, and the
system is booted /DEBUG. This will let us see why this breakpoint is
happening.
Arguments:
Arg1: ffffffffc000001d, The exception code that was not handled
Arg2: fffff880030b7dc8, The address that the exception occurred at
Arg3: fffff880065bb308, Exception Record Address
Arg4: fffff880065bab60, Context Record Address
Debugging Details:
------------------
EXCEPTION_CODE: (NTSTATUS) 0xc000001d - {EXCEPTION} Illegal Instruction An attempt was made to execute an illegal instruction.
FAULTING_IP:
dxgkrnl!DxgkCddGdiCommand+0
fffff880`030b7dc8 48895c2408 mov qword ptr [rsp+8],rbx
EXCEPTION_RECORD: fffff880065bb308 -- (.exr 0xfffff880065bb308)
ExceptionAddress: fffff880030b7dc8 (dxgkrnl!DxgkCddGdiCommand)
ExceptionCode: c000001d (Illegal instruction)
ExceptionFlags: 00000000
NumberParameters: 0
CONTEXT: fffff880065bab60 -- (.cxr 0xfffff880065bab60)
rax=0000000000000003 rbx=0000000000000000 rcx=fffff880065bb6b0
rdx=0000000000000000 rsi=0000000000000240 rdi=fffff900c00c04e8
rip=fffff880030b7dc8 rsp=fffff880065bb548 rbp=fffff900c00bf020
r8=0000000000000000 r9=0000000000000000 r10=fffffffffffffff7
r11=fffff880065bb838 r12=0000000000000001 r13=0000000000000000
r14=0000000000000001 r15=0000000000000004
iopl=0 nv up ei pl nz na pe nc
cs=0010 ss=0018 ds=002b es=002b fs=0053 gs=002b efl=00010202
dxgkrnl!DxgkCddGdiCommand:
fffff880`030b7dc8 48895c2408 mov qword ptr [rsp+8],rbx ss:0018:fffff880`065bb550=0000000000000000
Resetting default scope
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT
BUGCHECK_STR: 0x7E
PROCESS_NAME: csrss.exe
CURRENT_IRQL: 0
ERROR_CODE: (NTSTATUS) 0xc000001d - {EXCEPTION} Illegal Instruction An attempt was made to execute an illegal instruction.
LAST_CONTROL_TRANSFER: from fffff9600072b264 to fffff880030b7dc8
FAILED_INSTRUCTION_ADDRESS:
dxgkrnl!DxgkCddGdiCommand+0
fffff880`030b7dc8 48895c2408 mov qword ptr [rsp+8],rbx
STACK_TEXT:
fffff880`065bb548 fffff960`0072b264 : 00000000`00000000 00000000`00000000 fffff900`c00bf020 00000000`00000000 : dxgkrnl!DxgkCddGdiCommand
fffff880`065bb550 fffff960`007295d5 : fffffa80`0b083190 fffffa80`0b083190 00000000`00000000 fffff900`c00bf020 : cdd!CHwCommandBuffer::FlushGdiCommands+0xb4
fffff880`065bb840 fffff960`00725c6e : ffffffff`fffd74f6 00000000`00000010 00000000`00000001 fffff900`00000000 : cdd!CDDPDEV::FlushGdiOutput+0x81
fffff880`065bb870 fffff800`02f75fee : 00000000`01bed4b1 fffffa80`0b0d3b60 00000000`00000080 fffffa80`0b082b30 : cdd!PresentWorkerThread+0x902
fffff880`065bbc00 fffff800`02ccc5e6 : fffff880`033d7180 fffffa80`0b0d3b60 fffff880`033e1fc0 0000004b`00000000 : nt!PspSystemThreadStartup+0x5a
fffff880`065bbc40 00000000`00000000 : fffff880`065bc000 fffff880`065b6000 fffff880`065bb3a0 00000000`00000000 : nt!KxStartSystemThread+0x16
FOLLOWUP_IP:
dxgkrnl!DxgkCddGdiCommand+0
fffff880`030b7dc8 48895c2408 mov qword ptr [rsp+8],rbx
SYMBOL_STACK_INDEX: 0
SYMBOL_NAME: dxgkrnl!DxgkCddGdiCommand+0
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: dxgkrnl
IMAGE_NAME: dxgkrnl.sys
DEBUG_FLR_IMAGE_TIMESTAMP: 4ce799fa
STACK_COMMAND: .cxr 0xfffff880065bab60 ; kb
FAILURE_BUCKET_ID: X64_0x7E_BAD_IP_dxgkrnl!DxgkCddGdiCommand+0
BUCKET_ID: X64_0x7E_BAD_IP_dxgkrnl!DxgkCddGdiCommand+0
Followup: MachineOwner
---------