Code:
-
Loading Dump File [H:\BSODDmpFiles\Jessicka\Windows_NT6_BSOD_jcgriff2\012512-15459-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
Symbol search path is: SRV*c:\users\mike\documents\symbols*http://msdl.microsoft.com/download/symbols
Executable search path is:
Windows 7 Kernel Version 7601 (Service Pack 1) MP (12 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS
Built by: 7601.17640.amd64fre.win7sp1_gdr.110622-1506
Machine Name:
Kernel base = 0xfffff800`03211000 PsLoadedModuleList = 0xfffff800`03456670
Debug session time: Wed Jan 25 15:46:02.615 2012 (UTC - 7:00)
System Uptime: 0 days 1:36:52.630
Loading Kernel Symbols
...............................................................
................................................................
.................................
Loading User Symbols
Loading unloaded module list
....
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
Use !analyze -v to get detailed debugging information.
BugCheck 3B, {c0000096, fffff8000329d8f0, fffff8800e59a000, 0}
Probably caused by : hardware ( nt!PspReturnQuota+80 )
Followup: MachineOwner
---------
9: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
SYSTEM_SERVICE_EXCEPTION (3b)
An exception happened while executing a system service routine.
Arguments:
Arg1: 00000000c0000096, Exception code that caused the bugcheck
Arg2: fffff8000329d8f0, Address of the instruction which caused the bugcheck
Arg3: fffff8800e59a000, Address of the context record for the exception that caused the bugcheck
Arg4: 0000000000000000, zero.
Debugging Details:
------------------
EXCEPTION_CODE: (NTSTATUS) 0xc0000096 - {EXCEPTION} Privileged instruction.
FAULTING_IP:
nt!PspReturnQuota+80
fffff800`0329d8f0 6f outs dx,dword ptr [rsi]
CONTEXT: fffff8800e59a000 -- (.cxr 0xfffff8800e59a000)
rax=000000000000ef3c rbx=0000000000f5ef4c rcx=fffffa800e3a9840
rdx=0000000000f6de88 rsi=0000000000000000 rdi=0000000000000070
rip=fffff8000329d8f0 rsp=fffff8800e59a9e8 rbp=fffffa800e3a9840
r8=0000000000010000 r9=0000000000000070 r10=0000000000000000
r11=fffff8800e59ab38 r12=fffff800034381a0 r13=0000000000000000
r14=0000000000000000 r15=fffffa80116497a0
iopl=0 nv up ei ng nz na po cy
cs=0010 ss=0018 ds=002b es=002b fs=0053 gs=002b efl=00010287
nt!PspReturnQuota+0x80:
fffff800`0329d8f0 6f outs dx,dword ptr [rsi] ds:002b:00000000`00000000=????????
Resetting default scope
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT
BUGCHECK_STR: 0x3B
PROCESS_NAME: DCGAME.EXE
CURRENT_IRQL: 0
MISALIGNED_IP:
nt!PspReturnQuota+80
fffff800`0329d8f0 6f outs dx,dword ptr [rsi]
LAST_CONTROL_TRANSFER: from fffffa800e3a9840 to fffff8000329d8f0
STACK_TEXT:
fffff880`0e59a9e8 fffffa80`0e3a9840 : fffffa80`09daf260 00000000`00000000 00000000`00000705 00000000`00000000 : nt!PspReturnQuota+0x80
fffff880`0e59aa68 fffffa80`09daf260 : 00000000`00000000 00000000`00000705 00000000`00000000 fffff800`03584d86 : 0xfffffa80`0e3a9840
fffff880`0e59aa70 00000000`00000000 : 00000000`00000705 00000000`00000000 fffff800`03584d86 fffffa80`116497c0 : 0xfffffa80`09daf260
FOLLOWUP_IP:
nt!PspReturnQuota+80
fffff800`0329d8f0 6f outs dx,dword ptr [rsi]
SYMBOL_STACK_INDEX: 0
SYMBOL_NAME: nt!PspReturnQuota+80
FOLLOWUP_NAME: MachineOwner
IMAGE_NAME: hardware
DEBUG_FLR_IMAGE_TIMESTAMP: 0
STACK_COMMAND: .cxr 0xfffff8800e59a000 ; kb
MODULE_NAME: hardware
FAILURE_BUCKET_ID: X64_IP_MISALIGNED
BUCKET_ID: X64_IP_MISALIGNED
Followup: MachineOwner
---------
-
Loading Dump File [H:\BSODDmpFiles\Jessicka\Windows_NT6_BSOD_jcgriff2\010812-15787-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
Symbol search path is: SRV*c:\users\mike\documents\symbols*http://msdl.microsoft.com/download/symbols
Executable search path is:
Windows 7 Kernel Version 7601 (Service Pack 1) MP (12 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS
Built by: 7601.17640.amd64fre.win7sp1_gdr.110622-1506
Machine Name:
Kernel base = 0xfffff800`0324d000 PsLoadedModuleList = 0xfffff800`03492670
Debug session time: Sun Jan 8 00:18:54.060 2012 (UTC - 7:00)
System Uptime: 0 days 4:42:54.857
Loading Kernel Symbols
...............................................................
................................................................
.................................
Loading User Symbols
Loading unloaded module list
.....
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
Use !analyze -v to get detailed debugging information.
BugCheck 124, {0, fffffa800dfdc028, b2000000, 10005}
Probably caused by : hardware
Followup: MachineOwner
---------
8: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
WHEA_UNCORRECTABLE_ERROR (124)
A fatal hardware error has occurred. Parameter 1 identifies the type of error
source that reported the error. Parameter 2 holds the address of the
WHEA_ERROR_RECORD structure that describes the error conditon.
Arguments:
Arg1: 0000000000000000, Machine Check Exception
Arg2: fffffa800dfdc028, Address of the WHEA_ERROR_RECORD structure.
Arg3: 00000000b2000000, High order 32-bits of the MCi_STATUS value.
Arg4: 0000000000010005, Low order 32-bits of the MCi_STATUS value.
Debugging Details:
------------------
BUGCHECK_STR: 0x124_GenuineIntel
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT
PROCESS_NAME: DCGAME.EXE
CURRENT_IRQL: f
STACK_TEXT:
fffff880`033eac58 fffff800`03216a3b : 00000000`00000124 00000000`00000000 fffffa80`0dfdc028 00000000`b2000000 : nt!KeBugCheckEx
fffff880`033eac60 fffff800`033da513 : 00000000`00000001 fffffa80`0dfed570 00000000`00000000 fffffa80`0dfed5c0 : hal!HalBugCheckSystem+0x1e3
fffff880`033eaca0 fffff800`03216700 : 00000000`00000728 fffffa80`0dfed570 fffff880`033eb030 fffff880`033eb000 : nt!WheaReportHwError+0x263
fffff880`033ead00 fffff800`03216052 : fffffa80`0dfed570 fffff880`033eb030 fffffa80`0dfed570 00000000`00000000 : hal!HalpMcaReportError+0x4c
fffff880`033eae50 fffff800`03215f0d : 00000000`0000000c 00000000`00000001 fffff880`033eb0b0 00000000`00000000 : hal!HalpMceHandler+0x9e
fffff880`033eae90 fffff800`03209e88 : 00000000`4e4a7348 00000000`5305f440 00000000`00000000 00000000`00000000 : hal!HalpMceHandlerWithRendezvous+0x55
fffff880`033eaec0 fffff800`032c852c : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : hal!HalHandleMcheck+0x40
fffff880`033eaef0 fffff800`032c8393 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KxMcheckAbort+0x6c
fffff880`033eb030 fffff800`032c7c00 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiMcheckAbort+0x153
fffff880`0682dd80 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiPageFault
STACK_COMMAND: kb
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: hardware
IMAGE_NAME: hardware
DEBUG_FLR_IMAGE_TIMESTAMP: 0
FAILURE_BUCKET_ID: X64_0x124_GenuineIntel_PROCESSOR_MAE
BUCKET_ID: X64_0x124_GenuineIntel_PROCESSOR_MAE
Followup: MachineOwner
---------
-
Loading Dump File [H:\BSODDmpFiles\Jessicka\Windows_NT6_BSOD_jcgriff2\010612-16348-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
Symbol search path is: SRV*c:\users\mike\documents\symbols*http://msdl.microsoft.com/download/symbols
Executable search path is:
Windows 7 Kernel Version 7601 (Service Pack 1) MP (12 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS
Built by: 7601.17640.amd64fre.win7sp1_gdr.110622-1506
Machine Name:
Kernel base = 0xfffff800`0320f000 PsLoadedModuleList = 0xfffff800`03454670
Debug session time: Fri Jan 6 02:40:40.585 2012 (UTC - 7:00)
System Uptime: 0 days 7:53:40.600
Loading Kernel Symbols
...............................................................
................................................................
..................................
Loading User Symbols
Loading unloaded module list
....
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
Use !analyze -v to get detailed debugging information.
BugCheck A, {2100, e, 1, fffff800032ab6a3}
Probably caused by : ntkrnlmp.exe ( nt!KiIpiProcessRequests+c3 )
Followup: MachineOwner
---------
9: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
IRQL_NOT_LESS_OR_EQUAL (a)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high. This is usually
caused by drivers using improper addresses.
If a kernel debugger is available get the stack backtrace.
Arguments:
Arg1: 0000000000002100, memory referenced
Arg2: 000000000000000e, IRQL
Arg3: 0000000000000001, bitfield :
bit 0 : value 0 = read operation, 1 = write operation
bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
Arg4: fffff800032ab6a3, address which referenced memory
Debugging Details:
------------------
WRITE_ADDRESS: GetPointerFromAddress: unable to read from fffff800034be100
0000000000002100
CURRENT_IRQL: e
FAULTING_IP:
nt!KiIpiProcessRequests+c3
fffff800`032ab6a3 f0838500210000ff lock add dword ptr [rbp+2100h],0FFFFFFFFh
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT
BUGCHECK_STR: 0xA
PROCESS_NAME: System
TRAP_FRAME: fffff8800367e980 -- (.trap 0xfffff8800367e980)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=00000000000000d0 rbx=0000000000000000 rcx=fffff88003656180
rdx=0000566000000000 rsi=0000000000000000 rdi=0000000000000000
rip=fffff800032ab6a3 rsp=fffff8800367eb10 rbp=0000000000000000
r8=fffff880036611c0 r9=0000000000000000 r10=fffff8800365af00
r11=0000000000000002 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei ng nz ac pe cy
nt!KiIpiProcessRequests+0xc3:
fffff800`032ab6a3 f0838500210000ff lock add dword ptr [rbp+2100h],0FFFFFFFFh ss:0018:00000000`00002100=????????
Resetting default scope
LAST_CONTROL_TRANSFER: from fffff8000328b1e9 to fffff8000328bc40
STACK_TEXT:
fffff880`0367e838 fffff800`0328b1e9 : 00000000`0000000a 00000000`00002100 00000000`0000000e 00000000`00000001 : nt!KeBugCheckEx
fffff880`0367e840 fffff800`03289e60 : fffffa80`0e832000 00000000`00000000 fffffa80`11bb9378 00000000`00000001 : nt!KiBugCheckDispatch+0x69
fffff880`0367e980 fffff800`032ab6a3 : fffff880`0367eb70 fffff880`0367eb20 fffffa80`00000001 fffffa80`135b0130 : nt!KiPageFault+0x260
fffff880`0367eb10 fffff800`0329683a : fffff880`03656180 fffff880`0367ec70 fffffa80`09d68040 00000000`00000000 : nt!KiIpiProcessRequests+0xc3
fffff880`0367ebf0 fffff800`03283942 : fffff880`03656180 fffff880`00000001 00000000`00000001 fffff880`00000000 : nt!KiIpiInterrupt+0x12a
fffff880`0367ed80 00000000`00000000 : fffff880`0367f000 fffff880`03679000 fffff880`0367ed40 00000000`00000000 : nt!KiIdleLoop+0x32
STACK_COMMAND: kb
FOLLOWUP_IP:
nt!KiIpiProcessRequests+c3
fffff800`032ab6a3 f0838500210000ff lock add dword ptr [rbp+2100h],0FFFFFFFFh
SYMBOL_STACK_INDEX: 3
SYMBOL_NAME: nt!KiIpiProcessRequests+c3
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: nt
IMAGE_NAME: ntkrnlmp.exe
DEBUG_FLR_IMAGE_TIMESTAMP: 4e02aaa3
FAILURE_BUCKET_ID: X64_0xA_nt!KiIpiProcessRequests+c3
BUCKET_ID: X64_0xA_nt!KiIpiProcessRequests+c3
Followup: MachineOwner
---------
-
Loading Dump File [H:\BSODDmpFiles\Jessicka\Windows_NT6_BSOD_jcgriff2\122611-18517-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
Symbol search path is: SRV*c:\users\mike\documents\symbols*http://msdl.microsoft.com/download/symbols
Executable search path is:
Windows 7 Kernel Version 7600 MP (12 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS
Built by: 7600.16841.amd64fre.win7_gdr.110622-1503
Machine Name:
Kernel base = 0xfffff800`03266000 PsLoadedModuleList = 0xfffff800`034a3e70
Debug session time: Mon Dec 26 02:55:52.514 2011 (UTC - 7:00)
System Uptime: 0 days 9:42:40.622
Loading Kernel Symbols
...............................................................
................................................................
................................
Loading User Symbols
Loading unloaded module list
....
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
Use !analyze -v to get detailed debugging information.
BugCheck D1, {ffffffffffffffff, 0, 8, ffffffffffffffff}
Probably caused by : ntkrnlmp.exe ( nt!KiPageFault+260 )
Followup: MachineOwner
---------
9: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
DRIVER_IRQL_NOT_LESS_OR_EQUAL (d1)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high. This is usually
caused by drivers using improper addresses.
If kernel debugger is available get stack backtrace.
Arguments:
Arg1: ffffffffffffffff, memory referenced
Arg2: 0000000000000000, IRQL
Arg3: 0000000000000008, value 0 = read operation, 1 = write operation
Arg4: ffffffffffffffff, address which referenced memory
Debugging Details:
------------------
READ_ADDRESS: GetPointerFromAddress: unable to read from fffff8000350e0e0
ffffffffffffffff
CURRENT_IRQL: 0
FAULTING_IP:
+3939633862666261
ffffffff`ffffffff ?? ???
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT
BUGCHECK_STR: 0xD1
PROCESS_NAME: DCGAME.EXE
TRAP_FRAME: fffff880093a8920 -- (.trap 0xfffff880093a8920)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000000 rbx=0000000000000000 rcx=0000000000090500
rdx=000fffffffffffff rsi=0000000000000000 rdi=0000000000000000
rip=ffffffffffffffff rsp=fffff880093a8ab8 rbp=fffff6800018cd80
r8=0000000000000004 r9=0000098000000000 r10=fffffa8009c01780
r11=fffff880093a8c20 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei ng nz na pe nc
ffffffff`ffffffff ?? ???
Resetting default scope
LAST_CONTROL_TRANSFER: from fffff800032d5b29 to fffff800032d65c0
FAILED_INSTRUCTION_ADDRESS:
+3939633862666261
ffffffff`ffffffff ?? ???
STACK_TEXT:
fffff880`093a87d8 fffff800`032d5b29 : 00000000`0000000a ffffffff`ffffffff 00000000`00000000 00000000`00000008 : nt!KeBugCheckEx
fffff880`093a87e0 fffff800`032d47a0 : 00000000`00000008 fffff800`032f0e43 00000000`31980000 fffff800`0330ea4e : nt!KiBugCheckDispatch+0x69
fffff880`093a8920 ffffffff`ffffffff : fffff800`032f0e43 fffff680`0018cd80 fffff880`093a8b40 00000000`00000000 : nt!KiPageFault+0x260
fffff880`093a8ab8 fffff800`032f0e43 : fffff680`0018cd80 fffff880`093a8b40 00000000`00000000 00000000`00000000 : 0xffffffff`ffffffff
fffff880`093a8ac0 fffff800`032d46ae : 00000000`00000001 00000000`00040000 00000000`00000001 00000000`fff68000 : nt!MmAccessFault+0xbf3
fffff880`093a8c20 00000000`657fe31e : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiPageFault+0x16e
00000000`2a8cf890 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x657fe31e
STACK_COMMAND: kb
FOLLOWUP_IP:
nt!KiPageFault+260
fffff800`032d47a0 440f20c0 mov rax,cr8
SYMBOL_STACK_INDEX: 2
SYMBOL_NAME: nt!KiPageFault+260
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: nt
IMAGE_NAME: ntkrnlmp.exe
DEBUG_FLR_IMAGE_TIMESTAMP: 4e02aa44
FAILURE_BUCKET_ID: X64_0xD1_CODE_AV_BAD_IP_nt!KiPageFault+260
BUCKET_ID: X64_0xD1_CODE_AV_BAD_IP_nt!KiPageFault+260
Followup: MachineOwner
---------
- Loading Dump File [H:\BSODDmpFiles\Jessicka\Windows_NT6_BSOD_jcgriff2\122211-16333-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
Symbol search path is: SRV*c:\users\mike\documents\symbols*http://msdl.microsoft.com/download/symbols
Executable search path is:
Windows 7 Kernel Version 7600 MP (12 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS
Built by: 7600.16841.amd64fre.win7_gdr.110622-1503
Machine Name:
Kernel base = 0xfffff800`03209000 PsLoadedModuleList = 0xfffff800`03446e70
Debug session time: Wed Dec 21 23:23:25.558 2011 (UTC - 7:00)
System Uptime: 0 days 5:05:53.651
Loading Kernel Symbols
...............................................................
................................................................
................................
Loading User Symbols
Loading unloaded module list
....
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
Use !analyze -v to get detailed debugging information.
BugCheck BE, {fffff8801082ec51, 8000000328429121, fffff88004267f00, b}
Unable to load image \SystemRoot\system32\DRIVERS\nvlddmkm.sys, Win32 error 0n2
*** WARNING: Unable to verify timestamp for nvlddmkm.sys
*** ERROR: Module load completed but symbols could not be loaded for nvlddmkm.sys
Probably caused by : nvlddmkm.sys ( nvlddmkm+1090f5 )
Followup: MachineOwner
---------
9: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
ATTEMPTED_WRITE_TO_READONLY_MEMORY (be)
An attempt was made to write to readonly memory. The guilty driver is on the
stack trace (and is typically the current instruction pointer).
When possible, the guilty driver's name (Unicode string) is printed on
the bugcheck screen and saved in KiBugCheckDriver.
Arguments:
Arg1: fffff8801082ec51, Virtual address for the attempted write.
Arg2: 8000000328429121, PTE contents.
Arg3: fffff88004267f00, (reserved)
Arg4: 000000000000000b, (reserved)
Debugging Details:
------------------
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT
BUGCHECK_STR: 0xBE
PROCESS_NAME: System
CURRENT_IRQL: 0
TRAP_FRAME: fffff88004267f00 -- (.trap 0xfffff88004267f00)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=fffff8801082ec51 rbx=0000000000000000 rcx=fffffa80100f59c0
rdx=fffff88004268600 rsi=0000000000000000 rdi=0000000000000000
rip=fffff880101230f5 rsp=fffff88004268098 rbp=fffffa8010155ac0
r8=0000000000000000 r9=000000000031cb62 r10=0000000000300001
r11=0000000000000001 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei pl nz na pe nc
nvlddmkm+0x1090f5:
fffff880`101230f5 ?? ???
Resetting default scope
LAST_CONTROL_TRANSFER: from fffff800032f99c2 to fffff800032795c0
STACK_TEXT:
fffff880`04267d98 fffff800`032f99c2 : 00000000`000000be fffff880`1082ec51 80000003`28429121 fffff880`04267f00 : nt!KeBugCheckEx
fffff880`04267da0 fffff800`032776ae : 00000000`00000001 fffffa80`10687000 00000000`00000100 fffffa80`00000000 : nt! ?? ::FNODOBFM::`string'+0x4223e
fffff880`04267f00 fffff880`101230f5 : fffff880`04268600 fffffa80`1015fac0 fffffa80`106db000 fffffa80`0e6cc000 : nt!KiPageFault+0x16e
fffff880`04268098 fffff880`04268600 : fffffa80`1015fac0 fffffa80`106db000 fffffa80`0e6cc000 fffff880`1082ec50 : nvlddmkm+0x1090f5
fffff880`042680a0 fffffa80`1015fac0 : fffffa80`106db000 fffffa80`0e6cc000 fffff880`1082ec50 00000000`00000000 : 0xfffff880`04268600
fffff880`042680a8 fffffa80`106db000 : fffffa80`0e6cc000 fffff880`1082ec50 00000000`00000000 00000000`00000000 : 0xfffffa80`1015fac0
fffff880`042680b0 fffffa80`0e6cc000 : fffff880`1082ec50 00000000`00000000 00000000`00000000 fffff880`10c03f40 : 0xfffffa80`106db000
fffff880`042680b8 fffff880`1082ec50 : 00000000`00000000 00000000`00000000 fffff880`10c03f40 00000000`00000000 : 0xfffffa80`0e6cc000
fffff880`042680c0 00000000`00000000 : 00000000`00000000 fffff880`10c03f40 00000000`00000000 fffffa80`13b7d580 : nvlddmkm+0x814c50
STACK_COMMAND: kb
FOLLOWUP_IP:
nvlddmkm+1090f5
fffff880`101230f5 ?? ???
SYMBOL_STACK_INDEX: 3
SYMBOL_NAME: nvlddmkm+1090f5
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: nvlddmkm
IMAGE_NAME: nvlddmkm.sys
DEBUG_FLR_IMAGE_TIMESTAMP: 4e391010
FAILURE_BUCKET_ID: X64_0xBE_nvlddmkm+1090f5
BUCKET_ID: X64_0xBE_nvlddmkm+1090f5
Followup: MachineOwner
---------