Code:
-
Loading Dump File [C:\Users\Mike\Downloads\BSODDmpFiles\biged\012112-17877-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
Symbol search path is: SRV*c:\users\mike\documents\symbols*http://msdl.microsoft.com/download/symbols
Executable search path is:
Windows 7 Kernel Version 7601 (Service Pack 1) MP (4 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS Personal
Built by: 7601.17640.amd64fre.win7sp1_gdr.110622-1506
Machine Name:
Kernel base = 0xfffff800`02e18000 PsLoadedModuleList = 0xfffff800`0305d670
Debug session time: Sat Jan 21 08:21:54.751 2012 (UTC - 7:00)
System Uptime: 0 days 0:11:06.000
Loading Kernel Symbols
...............................................................
................................................................
...................................
Loading User Symbols
Loading unloaded module list
....
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
Use !analyze -v to get detailed debugging information.
BugCheck 1000007E, {ffffffffc0000005, fffff80002fc4a9b, fffff88003593748, fffff88003592fa0}
Probably caused by : Pool_Corruption ( nt!ExDeferredFreePool+1df )
Followup: Pool_corruption
---------
2: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
SYSTEM_THREAD_EXCEPTION_NOT_HANDLED_M (1000007e)
This is a very common bugcheck. Usually the exception address pinpoints
the driver/function that caused the problem. Always note this address
as well as the link date of the driver/image that contains this address.
Some common problems are exception code 0x80000003. This means a hard
coded breakpoint or assertion was hit, but this system was booted
/NODEBUG. This is not supposed to happen as developers should never have
hardcoded breakpoints in retail code, but ...
If this happens, make sure a debugger gets connected, and the
system is booted /DEBUG. This will let us see why this breakpoint is
happening.
Arguments:
Arg1: ffffffffc0000005, The exception code that was not handled
Arg2: fffff80002fc4a9b, The address that the exception occurred at
Arg3: fffff88003593748, Exception Record Address
Arg4: fffff88003592fa0, Context Record Address
Debugging Details:
------------------
EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - The instruction at 0x%08lx referenced memory at 0x%08lx. The memory could not be %s.
FAULTING_IP:
nt!ExDeferredFreePool+1df
fffff800`02fc4a9b 4c395808 cmp qword ptr [rax+8],r11
EXCEPTION_RECORD: fffff88003593748 -- (.exr 0xfffff88003593748)
ExceptionAddress: fffff80002fc4a9b (nt!ExDeferredFreePool+0x00000000000001df)
ExceptionCode: c0000005 (Access violation)
ExceptionFlags: 00000000
NumberParameters: 2
Parameter[0]: 0000000000000000
Parameter[1]: ffffffffffffffff
Attempt to read from address ffffffffffffffff
CONTEXT: fffff88003592fa0 -- (.cxr 0xfffff88003592fa0)
rax=006e00720075006f rbx=0000000000000000 rcx=fffff8000301f900
rdx=fffffa8006ec8060 rsi=0000000000000000 rdi=fffffa800b3fe940
rip=fffff80002fc4a9b rsp=fffff88003593980 rbp=0000000000000000
r8=fffffa800c3b6e00 r9=fffffa8006ec8000 r10=0000000000000001
r11=fffffa8006ec8010 r12=fffff8000301f340 r13=0000000000000000
r14=000000000000001a r15=0000000000000001
iopl=0 nv up ei pl nz na pe nc
cs=0010 ss=0018 ds=002b es=002b fs=0053 gs=002b efl=00010202
nt!ExDeferredFreePool+0x1df:
fffff800`02fc4a9b 4c395808 cmp qword ptr [rax+8],r11 ds:002b:006e0072`00750077=????????????????
Resetting default scope
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT
PROCESS_NAME: System
CURRENT_IRQL: 2
ERROR_CODE: (NTSTATUS) 0xc0000005 - The instruction at 0x%08lx referenced memory at 0x%08lx. The memory could not be %s.
EXCEPTION_PARAMETER1: 0000000000000000
EXCEPTION_PARAMETER2: ffffffffffffffff
READ_ADDRESS: GetPointerFromAddress: unable to read from fffff800030c7100
ffffffffffffffff
FOLLOWUP_IP:
nt!ExDeferredFreePool+1df
fffff800`02fc4a9b 4c395808 cmp qword ptr [rax+8],r11
BUGCHECK_STR: 0x7E
LAST_CONTROL_TRANSFER: from fffff80002fc41a1 to fffff80002fc4a9b
STACK_TEXT:
fffff880`03593980 fffff800`02fc41a1 : 00000000`00000000 fffffa80`075dd340 00000000`00000000 fffffa80`0a788300 : nt!ExDeferredFreePool+0x1df
fffff880`03593a10 fffff800`02edaa0e : fffff800`030968c0 fffff880`03593b18 fffffa80`6b576343 fffff800`03096801 : nt!ExFreePoolWithTag+0x411
fffff880`03593ac0 fffff800`02e9f001 : fffffa80`06d7d7d0 fffff800`0318b901 fffff800`030968c0 fffff800`00000002 : nt!CcWorkerThread+0x29e
fffff880`03593b70 fffff800`0312ffee : 7367358c`640fbc95 fffffa80`06cf7b60 00000000`00000080 fffffa80`06c914a0 : nt!ExpWorkerThread+0x111
fffff880`03593c00 fffff800`02e865e6 : fffff880`03365180 fffffa80`06cf7b60 fffff880`0336ffc0 00000000`00000000 : nt!PspSystemThreadStartup+0x5a
fffff880`03593c40 00000000`00000000 : fffff880`03594000 fffff880`0358e000 fffff880`03593440 00000000`00000000 : nt!KxStartSystemThread+0x16
SYMBOL_STACK_INDEX: 0
SYMBOL_NAME: nt!ExDeferredFreePool+1df
FOLLOWUP_NAME: Pool_corruption
IMAGE_NAME: Pool_Corruption
DEBUG_FLR_IMAGE_TIMESTAMP: 0
MODULE_NAME: Pool_Corruption
STACK_COMMAND: .cxr 0xfffff88003592fa0 ; kb
FAILURE_BUCKET_ID: X64_0x7E_nt!ExDeferredFreePool+1df
BUCKET_ID: X64_0x7E_nt!ExDeferredFreePool+1df
Followup: Pool_corruption
---------
-
Loading Dump File [C:\Users\Mike\Downloads\BSODDmpFiles\biged\012112-21886-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
Symbol search path is: SRV*c:\users\mike\documents\symbols*http://msdl.microsoft.com/download/symbols
Executable search path is:
Windows 7 Kernel Version 7601 (Service Pack 1) MP (4 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS Personal
Built by: 7601.17640.amd64fre.win7sp1_gdr.110622-1506
Machine Name:
Kernel base = 0xfffff800`02e17000 PsLoadedModuleList = 0xfffff800`0305c670
Debug session time: Sat Jan 21 07:58:15.191 2012 (UTC - 7:00)
System Uptime: 0 days 0:26:47.440
Loading Kernel Symbols
...............................................................
................................................................
...................................
Loading User Symbols
Loading unloaded module list
.......
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
Use !analyze -v to get detailed debugging information.
BugCheck 3B, {c0000005, fffff88000e05959, fffff880087dea60, 0}
Unable to load image FP64.SYS, Win32 error 0n2
*** WARNING: Unable to verify timestamp for FP64.SYS
*** ERROR: Module load completed but symbols could not be loaded for FP64.SYS
Probably caused by : FP64.SYS ( FP64+5959 )
Followup: MachineOwner
---------
0: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
SYSTEM_SERVICE_EXCEPTION (3b)
An exception happened while executing a system service routine.
Arguments:
Arg1: 00000000c0000005, Exception code that caused the bugcheck
Arg2: fffff88000e05959, Address of the instruction which caused the bugcheck
Arg3: fffff880087dea60, Address of the context record for the exception that caused the bugcheck
Arg4: 0000000000000000, zero.
Debugging Details:
------------------
OVERLAPPED_MODULE: Address regions for 'IDSvia64' and 'IDSvia64.sys' overlap
EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - The instruction at 0x%08lx referenced memory at 0x%08lx. The memory could not be %s.
FAULTING_IP:
FP64+5959
fffff880`00e05959 48393b cmp qword ptr [rbx],rdi
CONTEXT: fffff880087dea60 -- (.cxr 0xfffff880087dea60)
rax=0000000000000001 rbx=002e003900410046 rcx=fffffa800ce864b0
rdx=fffff88000e0b230 rsi=fffff880087df8a0 rdi=fffffa800d98f330
rip=fffff88000e05959 rsp=fffff880087df440 rbp=fffffa800c077cc8
r8=fffffa8007a00010 r9=fffffa800bf31a30 r10=fffff8000301e348
r11=0000000000000019 r12=fffffa8007a00010 r13=fffffa800d98f330
r14=0000000000000000 r15=fffffa800bf31a30
iopl=0 nv up ei pl nz na pe nc
cs=0010 ss=0018 ds=002b es=002b fs=0053 gs=002b efl=00010202
FP64+0x5959:
fffff880`00e05959 48393b cmp qword ptr [rbx],rdi ds:002b:002e0039`00410046=????????????????
Resetting default scope
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT
BUGCHECK_STR: 0x3B
PROCESS_NAME: svchost.exe
CURRENT_IRQL: 0
LAST_CONTROL_TRANSFER: from fffffa800c13b190 to fffff88000e05959
STACK_TEXT:
fffff880`087df440 fffffa80`0c13b190 : fffff800`0319b668 fffffa80`00000000 fffffa80`06d37b01 fffffa80`0bf24750 : FP64+0x5959
fffff880`087df448 fffff800`0319b668 : fffffa80`00000000 fffffa80`06d37b01 fffffa80`0bf24750 fffff880`00e05a2e : 0xfffffa80`0c13b190
fffff880`087df450 fffff800`03191f95 : 00000000`00000045 fffffa80`0c077cc8 fffff880`087df8a0 fffffa80`0d98f3c8 : nt!IopAllocRealFileObject+0x128
fffff880`087df500 fffff800`0318e838 : fffffa80`094e1a50 fffff800`00000000 fffffa80`0c077b10 fffffa80`00000001 : nt!IopParseDevice+0x5a5
fffff880`087df690 fffff800`0318fa56 : 00000000`00000000 fffffa80`0c077b10 fffff880`087dfa00 fffffa80`06d01f30 : nt!ObpLookupObjectName+0x588
fffff880`087df780 fffff800`0316f9d6 : fffffa80`0954e8e0 00000000`02e1d520 00000000`00000001 00000000`01a90260 : nt!ObOpenObjectByName+0x306
fffff880`087df850 fffff800`02e92ed3 : fffffa80`0c126b60 00000000`00000000 fffffa80`0c126b60 fffffa80`0c002dd0 : nt!NtQueryAttributesFile+0x145
fffff880`087dfae0 00000000`776516ea : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x13
00000000`02e1d488 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x776516ea
FOLLOWUP_IP:
FP64+5959
fffff880`00e05959 48393b cmp qword ptr [rbx],rdi
SYMBOL_STACK_INDEX: 0
SYMBOL_NAME: FP64+5959
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: FP64
IMAGE_NAME: FP64.SYS
DEBUG_FLR_IMAGE_TIMESTAMP: 4e7f7f4e
STACK_COMMAND: .cxr 0xfffff880087dea60 ; kb
FAILURE_BUCKET_ID: X64_0x3B_FP64+5959
BUCKET_ID: X64_0x3B_FP64+5959
Followup: MachineOwner
---------
-
Loading Dump File [C:\Users\Mike\Downloads\BSODDmpFiles\biged\012112-25318-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
Symbol search path is: SRV*c:\users\mike\documents\symbols*http://msdl.microsoft.com/download/symbols
Executable search path is:
Windows 7 Kernel Version 7601 (Service Pack 1) MP (4 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS Personal
Built by: 7601.17640.amd64fre.win7sp1_gdr.110622-1506
Machine Name:
Kernel base = 0xfffff800`02e0c000 PsLoadedModuleList = 0xfffff800`03051670
Debug session time: Sat Jan 21 06:58:10.856 2012 (UTC - 7:00)
System Uptime: 0 days 0:15:08.104
Loading Kernel Symbols
...............................................................
................................................................
...................................
Loading User Symbols
Loading unloaded module list
....
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
Use !analyze -v to get detailed debugging information.
BugCheck 1000007E, {ffffffffc0000005, fffff88001174678, fffff880035c4798, fffff880035c3ff0}
Probably caused by : fltmgr.sys ( fltmgr!DoFreeContext+28 )
Followup: MachineOwner
---------
1: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
SYSTEM_THREAD_EXCEPTION_NOT_HANDLED_M (1000007e)
This is a very common bugcheck. Usually the exception address pinpoints
the driver/function that caused the problem. Always note this address
as well as the link date of the driver/image that contains this address.
Some common problems are exception code 0x80000003. This means a hard
coded breakpoint or assertion was hit, but this system was booted
/NODEBUG. This is not supposed to happen as developers should never have
hardcoded breakpoints in retail code, but ...
If this happens, make sure a debugger gets connected, and the
system is booted /DEBUG. This will let us see why this breakpoint is
happening.
Arguments:
Arg1: ffffffffc0000005, The exception code that was not handled
Arg2: fffff88001174678, The address that the exception occurred at
Arg3: fffff880035c4798, Exception Record Address
Arg4: fffff880035c3ff0, Context Record Address
Debugging Details:
------------------
EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - The instruction at 0x%08lx referenced memory at 0x%08lx. The memory could not be %s.
FAULTING_IP:
fltmgr!DoFreeContext+28
fffff880`01174678 66837f1820 cmp word ptr [rdi+18h],20h
EXCEPTION_RECORD: fffff880035c4798 -- (.exr 0xfffff880035c4798)
ExceptionAddress: fffff88001174678 (fltmgr!DoFreeContext+0x0000000000000028)
ExceptionCode: c0000005 (Access violation)
ExceptionFlags: 00000000
NumberParameters: 2
Parameter[0]: 0000000000000000
Parameter[1]: 0000005c006c0079
Attempt to read from address 0000005c006c0079
CONTEXT: fffff880035c3ff0 -- (.cxr 0xfffff880035c3ff0)
rax=0000000000000000 rbx=fffffa800d31d790 rcx=fffffa800d31d790
rdx=fffffa800d31d790 rsi=0000000000000000 rdi=0000005c006c0061
rip=fffff88001174678 rsp=fffff880035c49d0 rbp=0000000000000000
r8=0000000000000000 r9=fffff880035c4a18 r10=fffff80002e0c000
r11=fffffa800d31d7a8 r12=fffffa800d27e2d0 r13=0000000000000000
r14=fffffa800a055be0 r15=0000000000000001
iopl=0 nv up ei pl zr na po nc
cs=0010 ss=0018 ds=002b es=002b fs=0053 gs=002b efl=00010246
fltmgr!DoFreeContext+0x28:
fffff880`01174678 66837f1820 cmp word ptr [rdi+18h],20h ds:002b:0000005c`006c0079=????
Resetting default scope
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: STRING_DEREFERENCE
PROCESS_NAME: System
CURRENT_IRQL: 0
ERROR_CODE: (NTSTATUS) 0xc0000005 - The instruction at 0x%08lx referenced memory at 0x%08lx. The memory could not be %s.
EXCEPTION_PARAMETER1: 0000000000000000
EXCEPTION_PARAMETER2: 0000005c006c0079
READ_ADDRESS: GetPointerFromAddress: unable to read from fffff800030bb100
0000005c006c0079
FOLLOWUP_IP:
fltmgr!DoFreeContext+28
fffff880`01174678 66837f1820 cmp word ptr [rdi+18h],20h
BUGCHECK_STR: 0x7E
LAST_CONTROL_TRANSFER: from fffff88001174f8a to fffff88001174678
STACK_TEXT:
fffff880`035c49d0 fffff880`01174f8a : 00000000`00000000 fffffa80`0a055be0 00000000`00000000 fffffa80`0d31d7a8 : fltmgr!DoFreeContext+0x28
fffff880`035c4a00 fffff880`0119c0f1 : fffffa80`0d27e280 fffffa80`0d27e280 fffffa80`00000000 fffffa80`0d31d790 : fltmgr!DeleteContextFromStreamList+0x11a
fffff880`035c4a70 fffff880`011906ce : fffffa80`0972b580 00000000`00000001 fffffa80`0972b580 fffffa80`09f7f528 : fltmgr!FltpRemoveAllFileObjectContextsForInstance+0x21
fffff880`035c4aa0 fffff880`0118c705 : 00000000`00000001 fffffa80`0972b010 fffffa80`09419820 fffffa80`0a055be0 : fltmgr! ?? ::NNGAKEGL::`string'+0x168f
fffff880`035c4ad0 fffff880`0119d3c7 : fffffa80`09f7f528 00000000`00000001 fffffa80`09f7f520 fffffa80`06d05680 : fltmgr!FltpFreeInstance+0xd5
fffff880`035c4b40 fffff800`02e93001 : fffff880`01196e00 fffff800`03029201 fffffa80`06d05600 fffffa80`06d05680 : fltmgr!FltpCommonDetachVolumeWorker+0x17
fffff880`035c4b70 fffff800`03123fee : 00000000`00000000 fffffa80`06d05680 00000000`00000080 fffffa80`06c914a0 : nt!ExpWorkerThread+0x111
fffff880`035c4c00 fffff800`02e7a5e6 : fffff880`03365180 fffffa80`06d05680 fffff880`0336ffc0 00000000`00000000 : nt!PspSystemThreadStartup+0x5a
fffff880`035c4c40 00000000`00000000 : fffff880`035c5000 fffff880`035bf000 fffff880`035c44c0 00000000`00000000 : nt!KxStartSystemThread+0x16
SYMBOL_STACK_INDEX: 0
SYMBOL_NAME: fltmgr!DoFreeContext+28
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: fltmgr
IMAGE_NAME: fltmgr.sys
DEBUG_FLR_IMAGE_TIMESTAMP: 4ce7929c
STACK_COMMAND: .cxr 0xfffff880035c3ff0 ; kb
FAILURE_BUCKET_ID: X64_0x7E_fltmgr!DoFreeContext+28
BUCKET_ID: X64_0x7E_fltmgr!DoFreeContext+28
Followup: MachineOwner
---------
-
Loading Dump File [C:\Users\Mike\Downloads\BSODDmpFiles\biged\012012-16395-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
Symbol search path is: SRV*c:\users\mike\documents\symbols*http://msdl.microsoft.com/download/symbols
Executable search path is:
Windows 7 Kernel Version 7601 (Service Pack 1) MP (4 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS Personal
Built by: 7601.17640.amd64fre.win7sp1_gdr.110622-1506
Machine Name:
Kernel base = 0xfffff800`02e5d000 PsLoadedModuleList = 0xfffff800`030a2670
Debug session time: Fri Jan 20 19:19:16.953 2012 (UTC - 7:00)
System Uptime: 0 days 0:20:58.202
Loading Kernel Symbols
...............................................................
................................................................
...................................
Loading User Symbols
Loading unloaded module list
....
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
Use !analyze -v to get detailed debugging information.
BugCheck 3B, {c0000005, fffff80002ed1b65, fffff88007d406e0, 0}
Probably caused by : dxgmms1.sys ( dxgmms1!VIDMM_GLOBAL::OpenOneAllocation+11e )
Followup: MachineOwner
---------
1: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
SYSTEM_SERVICE_EXCEPTION (3b)
An exception happened while executing a system service routine.
Arguments:
Arg1: 00000000c0000005, Exception code that caused the bugcheck
Arg2: fffff80002ed1b65, Address of the instruction which caused the bugcheck
Arg3: fffff88007d406e0, Address of the context record for the exception that caused the bugcheck
Arg4: 0000000000000000, zero.
Debugging Details:
------------------
EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - The instruction at 0x%08lx referenced memory at 0x%08lx. The memory could not be %s.
FAULTING_IP:
nt!ExpInterlockedPopEntrySListFault16+0
fffff800`02ed1b65 498b08 mov rcx,qword ptr [r8]
CONTEXT: fffff88007d406e0 -- (.cxr 0xfffff88007d406e0)
rax=00000000fcc5002b rbx=0000000000000000 rcx=fffff880009eba60
rdx=006e007200750070 rsi=0000000000000002 rdi=0000000000000000
rip=fffff80002ed1b65 rsp=fffff88007d410c0 rbp=fffff880009eba60
r8=006e00720075006f r9=fffff80002e5d000 r10=fffff880009eba60
r11=fffff880065bd8c0 r12=fffff80003064340 r13=0000000000000000
r14=0000000000000002 r15=000000006d4d6956
iopl=0 nv up ei pl nz ac po nc
cs=0010 ss=0018 ds=002b es=002b fs=0053 gs=002b efl=00010216
nt!ExpInterlockedPopEntrySListFault16:
fffff800`02ed1b65 498b08 mov rcx,qword ptr [r8] ds:002b:006e0072`0075006f=????????????????
Resetting default scope
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT
BUGCHECK_STR: 0x3B
PROCESS_NAME: WLXPGSS.SCR
CURRENT_IRQL: 0
LAST_CONTROL_TRANSFER: from fffff800030081de to fffff80002ed1b65
STACK_TEXT:
fffff880`07d410c0 fffff800`030081de : fffffa80`0bc21000 fffff880`065c66d2 00000000`00001000 fffff8a0`00baf160 : nt!ExpInterlockedPopEntrySListFault16
fffff880`07d410d0 fffff880`065c6dee : fffff880`00000174 00000000`00000000 fffffa80`0bc21000 00000000`000007ff : nt!ExAllocatePoolWithTag+0xfe
fffff880`07d411c0 fffff880`065adaa7 : fffff8a0`03d540f0 fffff8a0`103a0420 fffff880`07d41330 00000000`00000000 : dxgmms1!VIDMM_GLOBAL::OpenOneAllocation+0x11e
fffff880`07d412a0 fffff880`064f9469 : 00000000`00000000 fffff880`07d41770 00000000`00000000 fffff8a0`00c39ee0 : dxgmms1!VidMmOpenAllocation+0xeb
fffff880`07d412f0 fffff880`064f2610 : fffff880`07d41558 fffff8a0`1194d4e0 fffff880`07d41730 fffff880`07d41730 : dxgkrnl!DXGDEVICE::CreateVidMmAllocations<_DXGK_ALLOCATIONINFO>+0x291
fffff880`07d41380 fffff880`064f526b : fffff8a0`134a6000 fffff880`07d419f0 fffff880`07d41b01 00000000`00000000 : dxgkrnl!DXGDEVICE::CreateAllocation+0xca8
fffff880`07d41980 fffff960`001ff4ae : 00000000`06b3e4b0 00000000`40000e40 00000000`72fe2450 fffff800`000007d3 : dxgkrnl!DxgkCreateAllocation+0x42b
fffff880`07d41ab0 fffff800`02ed8ed3 : 00000000`3f80b686 fffff880`07d41b60 00000000`02ea58a0 00000000`0012001c : win32k!NtGdiDdDDICreateAllocation+0x12
fffff880`07d41ae0 00000000`730313aa : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x13
00000000`06b3e468 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x730313aa
FOLLOWUP_IP:
dxgmms1!VIDMM_GLOBAL::OpenOneAllocation+11e
fffff880`065c6dee 4989442420 mov qword ptr [r12+20h],rax
SYMBOL_STACK_INDEX: 2
SYMBOL_NAME: dxgmms1!VIDMM_GLOBAL::OpenOneAllocation+11e
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: dxgmms1
IMAGE_NAME: dxgmms1.sys
DEBUG_FLR_IMAGE_TIMESTAMP: 4ce799c1
STACK_COMMAND: .cxr 0xfffff88007d406e0 ; kb
FAILURE_BUCKET_ID: X64_0x3B_dxgmms1!VIDMM_GLOBAL::OpenOneAllocation+11e
BUCKET_ID: X64_0x3B_dxgmms1!VIDMM_GLOBAL::OpenOneAllocation+11e
Followup: MachineOwner
---------