Microsoft (R) Windows Debugger Version 6.12.0002.633 AMD64 Copyright (c) Microsoft Corporation. All rights reserved. Loading Dump File [\\COUCHNAS\media\Knut Dokumenter\072711-23259-01.dmp] Mini Kernel Dump File: Only registers and stack trace are available Symbol search path is: srv*"c:\temp"*http://msdl.microsoft.com/downloads/symbols Executable search path is: srv*c:\temp*http://msdl.microsoft.com/downloads/symbols Windows 7 Kernel Version 7601 (Service Pack 1) MP (4 procs) Free x64 Product: WinNt, suite: TerminalServer SingleUserTS Personal Built by: 7601.17592.amd64fre.win7sp1_gdr.110408-1631 Machine Name: Kernel base = 0xfffff800`02c61000 PsLoadedModuleList = 0xfffff800`02ea6650 Debug session time: Wed Jul 27 22:06:42.283 2011 (UTC + 2:00) System Uptime: 0 days 15:02:05.641 Loading Kernel Symbols ............................................................... ................................................................ ........................ Loading User Symbols Loading unloaded module list ................ ******************************************************************************* * * * Bugcheck Analysis * * * ******************************************************************************* Use !analyze -v to get detailed debugging information. BugCheck C1, {fffff98037390fa0, fffff9803739063b, b14068, 32} Unable to load image atikmpag.sys, Win32 error 0n2 *** WARNING: Unable to verify timestamp for atikmpag.sys *** ERROR: Module load completed but symbols could not be loaded for atikmpag.sys Probably caused by : atikmpag.sys ( atikmpag+5eff ) Followup: MachineOwner --------- 3: kd> !analyze -v ******************************************************************************* * * * Bugcheck Analysis * * * ******************************************************************************* SPECIAL_POOL_DETECTED_MEMORY_CORRUPTION (c1) Special pool has detected memory corruption. Typically the current thread's stack backtrace will reveal the guilty party. Arguments: Arg1: fffff98037390fa0, address trying to free Arg2: fffff9803739063b, address where one bit is corrupted Arg3: 0000000000b14068, (reserved) Arg4: 0000000000000032, caller is freeing an address where nearby bytes within the same page have a single bit error Debugging Details: ------------------ BUGCHECK_STR: 0xC1_32 SPECIAL_POOL_CORRUPTION_TYPE: 32 CUSTOMER_CRASH_COUNT: 1 DEFAULT_BUCKET_ID: VERIFIER_ENABLED_VISTA_MINIDUMP PROCESS_NAME: bf3.exe CURRENT_IRQL: 0 LAST_CONTROL_TRANSFER: from fffff80002d66fe3 to fffff80002ce0d00 STACK_TEXT: fffff880`091c8288 fffff800`02d66fe3 : 00000000`000000c1 fffff980`37390fa0 fffff980`3739063b 00000000`00b14068 : nt!KeBugCheckEx fffff880`091c8290 fffff800`02ddfa03 : 00000000`00000000 00000000`00000002 00000000`00000000 00000000`00000001 : nt!MiCheckSpecialPoolSlop+0x83 fffff880`091c82d0 fffff800`02e0b93b : fffff800`02c61000 00000000`5958504b ffffffff`fed6df78 fffff800`03177870 : nt!MmFreeSpecialPool+0x1d3 fffff880`091c8410 fffff880`02ce7eff : fffff980`023fe740 fffff880`042db0d1 00000000`00000001 fffffa80`05ae1000 : nt!ExDeferredFreePool+0xf33 fffff880`091c84c0 fffff980`023fe740 : fffff880`042db0d1 00000000`00000001 fffffa80`05ae1000 fffff8a0`00000001 : atikmpag+0x5eff fffff880`091c84c8 fffff880`042db0d1 : 00000000`00000001 fffffa80`05ae1000 fffff8a0`00000001 fffff8a0`02f7aab0 : 0xfffff980`023fe740 fffff880`091c84d0 fffff880`0430e204 : fffffa80`05ae1000 00000000`00000000 fffff880`091c8570 00000000`00000000 : dxgkrnl!DXGADAPTER::AcquireDdiSync+0xc9 fffff880`091c8510 fffff880`043122c1 : fffff8a0`02f7aab0 00000000`00000000 00000000`00000000 fffff8a0`0955d000 : dxgkrnl!DXGADAPTER::DdiDestroyAllocation+0x50 fffff880`091c8540 fffff880`04324784 : 00000000`00000001 00000000`00000000 00000000`00000000 fffff8a0`00000799 : dxgkrnl!DXGDEVICE::DestroyAllocations+0x83d fffff880`091c8630 fffff880`04309815 : 00000000`fffffeda fffff8a0`14654150 fffff8a0`0955d000 fffffa80`05ae1000 : dxgkrnl!DXGDEVICE::~DXGDEVICE+0x19c fffff880`091c86a0 fffff880`04347e4a : 00000000`00000001 fffffa80`05ae1000 fffff8a0`14654150 fffff8a0`146541d0 : dxgkrnl!DXGADAPTER::DestroyDevice+0x1c9 fffff880`091c86d0 fffff880`043477e0 : fffff900`c0130ce0 00000000`00000000 00000000`00000001 fffff900`c0130ce0 : dxgkrnl!DXGPROCESS::Destroy+0xba fffff880`091c8780 fffff960`000f5134 : 00000000`00001408 fffff900`c0130ce0 00000000`00000000 fffff900`c0130ce0 : dxgkrnl!DxgkProcessCallout+0x268 fffff880`091c8810 fffff960`000f4823 : 00000000`00000000 fffff880`091c8c20 fffffa80`0763b970 00000000`00000000 : win32k!GdiProcessCallout+0x244 fffff880`091c8890 fffff800`02fb6171 : 00000000`00000000 00000000`00000000 00000000`00000000 fffffa80`0763b900 : win32k!W32pProcessCallout+0x6b fffff880`091c88c0 fffff800`02f9b51d : 00000000`c0000005 00000000`0501bc01 00000000`78457300 00000000`00000000 : nt!PspExitThread+0x4d1 fffff880`091c89c0 fffff800`02cd447a : fffffa80`06d48a60 fffff8a0`12f92730 60000000`00000098 00000000`00000001 : nt!PsExitSpecialApc+0x1d fffff880`091c89f0 fffff800`02cd47c0 : 00000000`00000246 fffff880`091c8a70 fffff800`02f9b490 00000000`00000001 : nt!KiDeliverApc+0x2ca fffff880`091c8a70 fffff800`02ce0037 : 00000000`00000000 fffff800`02fc921c fffff880`091c8ca0 00000000`00000000 : nt!KiInitiateUserApc+0x70 fffff880`091c8bb0 00000000`73442e09 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceExit+0x9c 00000000`0b3bf0f8 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x73442e09 STACK_COMMAND: kb FOLLOWUP_IP: atikmpag+5eff fffff880`02ce7eff ?? ??? SYMBOL_STACK_INDEX: 4 SYMBOL_NAME: atikmpag+5eff FOLLOWUP_NAME: MachineOwner MODULE_NAME: atikmpag IMAGE_NAME: atikmpag.sys DEBUG_FLR_IMAGE_TIMESTAMP: 4d76ff66 FAILURE_BUCKET_ID: X64_0xC1_32_VRF_atikmpag+5eff BUCKET_ID: X64_0xC1_32_VRF_atikmpag+5eff Followup: MachineOwner ---------