Microsoft (R) Windows Debugger Version 6.12.0002.633 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [F:\DMP\041611-21325-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
Symbol search path is: SRV*c:\websymbols*http://msdl.microsoft.com/download/symbols
Executable search path is:
Windows 7 Kernel Version 7600 MP (8 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS Personal
Built by: 7600.16695.amd64fre.win7_gdr.101026-1503
Machine Name:
Kernel base = 0xfffff800`03268000 PsLoadedModuleList = 0xfffff800`034a5e50
Debug session time: Sat Apr 16 10:49:24.896 2011 (UTC - 4:00)
System Uptime: 0 days 0:40:48.098
Loading Kernel Symbols
...............................................................
................................................................
....................................................
Loading User Symbols
Loading unloaded module list
......
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
Use !analyze -v to get detailed debugging information.
BugCheck 1A, {403, fffff6800006d810, afd0000298315025, 730077006f0064}
Probably caused by : win32k.sys ( win32k!EngUnmapFontFileFD+8a )
Followup: MachineOwner
---------
6: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
MEMORY_MANAGEMENT (1a)
# Any other values for parameter 1 must be individually examined.
Arguments:
Arg1: 0000000000000403, The subtype of the bugcheck.
Arg2: fffff6800006d810
Arg3: afd0000298315025
Arg4: 00730077006f0064
Debugging Details:
------------------
BUGCHECK_STR: 0x1a_403
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT
PROCESS_NAME: csrss.exe
CURRENT_IRQL: 0
LAST_CONTROL_TRANSFER: from fffff8000334a6c8 to fffff800032d8740
STACK_TEXT:
fffff880`0c4d0278 fffff800`0334a6c8 : 00000000`0000001a 00000000`00000403 fffff680`0006d810 afd00002`98315025 : nt!KeBugCheckEx
fffff880`0c4d0280 fffff800`03309381 : 00000003`00000000 fffff680`0006da60 fffffa80`086fcb30 ede00001`1b961025 : nt! ?? ::FNODOBFM::`string'+0x31ef2
fffff880`0c4d0430 fffff800`0330bdf9 : 00000000`00000000 00000000`0e145fff fffff900`00000000 fffff900`00000000 : nt!MiDeleteVirtualAddresses+0x408
fffff880`0c4d05f0 fffff800`035ef010 : fffffa80`0c34d430 0007ffff`00000000 fffffa80`0870b8c0 fffffa80`0870b8c0 : nt!MiRemoveMappedView+0xd9
fffff880`0c4d0710 fffff960`0007851e : fffff900`00000000 fffff900`c009e1b8 fffff900`00000001 fffff900`c232d010 : nt!MiUnmapViewOfSection+0x1b0
fffff880`0c4d07d0 fffff960`0029bd33 : fffff900`c00a0d10 00000000`00000000 fffffa80`00000040 00000000`00000000 : win32k!EngUnmapFontFileFD+0x8a
fffff880`0c4d0830 fffff960`0026305a : fffff960`0029bca8 fffff880`0c4d0950 fffff900`c009ff30 fffff960`000293b5 : win32k!ttfdSemDestroyFont+0x8b
fffff880`0c4d0860 fffff960`0026128e : fffffa80`0b6831d0 fffff880`0c4d0960 fffff880`0c4d09c0 fffff880`0c4d0c20 : win32k!PDEVOBJ::DestroyFont+0xf2
fffff880`0c4d08d0 fffff960`00087ad3 : fffffa80`0b6831d0 fffff900`c232d010 fffff900`c008a010 00000000`00000000 : win32k!RFONTOBJ::vDeleteRFONT+0x4a
fffff880`0c4d0940 fffff960`00087507 : fffff900`c232d010 fffff880`0c4d09e0 fffff900`c232d010 fffff880`0c4d0c20 : win32k!RFONTOBJ::bMakeInactiveHelper+0x427
fffff880`0c4d09c0 fffff960`00088ab4 : 00000000`00000000 00000000`00000000 fffff880`0c4d0c20 fffff880`0c4d10b0 : win32k!RFONTOBJ::vMakeInactive+0xa3
fffff880`0c4d0a60 fffff960`000425b1 : 00000000`000004d4 fffff900`c23ab8f4 00000000`00000000 fffff900`00000004 : win32k!RFONTOBJ::bInit+0x1ec
fffff880`0c4d0b80 fffff960`002144da : 00000000`00000000 fffff880`0000008c fffff880`00000082 00000000`00000000 : win32k!GreExtTextOutWLocked+0x7e5
fffff880`0c4d0fa0 fffff960`0008cf0f : 00000000`76b06e30 fffff960`0008af94 fffff880`00666666 fffff900`00ffffff : win32k!GreBatchTextOut+0x26a
fffff880`0c4d1040 fffff800`032d789c : 00000000`00000004 fffff960`001ed460 00000000`00000001 fffffa80`00000001 : win32k!NtGdiFlushUserBatch+0x377
fffff880`0c4d12a0 00000000`74752dd9 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceGdiTebAccess+0x25
00000000`000cd398 fffff800`032d0080 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x74752dd9
fffff880`0c4d1690 00000000`000ce248 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiCallUserMode
fffff880`0c4d1698 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 fffff880`0c4d1db0 : 0xce248
STACK_COMMAND: kb
FOLLOWUP_IP:
win32k!EngUnmapFontFileFD+8a
fffff960`0007851e 48837c242800 cmp qword ptr [rsp+28h],0
SYMBOL_STACK_INDEX: 5
SYMBOL_NAME: win32k!EngUnmapFontFileFD+8a
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: win32k
IMAGE_NAME: win32k.sys
DEBUG_FLR_IMAGE_TIMESTAMP: 4d23ecb0
FAILURE_BUCKET_ID: X64_0x1a_403_win32k!EngUnmapFontFileFD+8a
BUCKET_ID: X64_0x1a_403_win32k!EngUnmapFontFileFD+8a
Followup: MachineOwner
---------
Microsoft (R) Windows Debugger Version 6.12.0002.633 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [F:\DMP\041611-21028-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
Symbol search path is: SRV*c:\websymbols*http://msdl.microsoft.com/download/symbols
Executable search path is:
Windows 7 Kernel Version 7600 MP (8 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS Personal
Built by: 7600.16695.amd64fre.win7_gdr.101026-1503
Machine Name:
Kernel base = 0xfffff800`03266000 PsLoadedModuleList = 0xfffff800`034a3e50
Debug session time: Sat Apr 16 11:23:20.017 2011 (UTC - 4:00)
System Uptime: 0 days 0:32:33.109
Loading Kernel Symbols
...............................................................
................................................................
...................................................
Loading User Symbols
Loading unloaded module list
.......
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
Use !analyze -v to get detailed debugging information.
BugCheck 50, {fffff8a20b80a6fc, 0, fffff880012c45a9, 5}
Could not read faulting driver name
Probably caused by : Ntfs.sys ( Ntfs!NtfsCheckExistingFile+f9 )
Followup: MachineOwner
---------
6: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
PAGE_FAULT_IN_NONPAGED_AREA (50)
Invalid system memory was referenced. This cannot be protected by try-except,
it must be protected by a Probe. Typically the address is just plain bad or it
is pointing at freed memory.
Arguments:
Arg1: fffff8a20b80a6fc, memory referenced.
Arg2: 0000000000000000, value 0 = read operation, 1 = write operation.
Arg3: fffff880012c45a9, If non-zero, the instruction address which referenced the bad memory
address.
Arg4: 0000000000000005, (reserved)
Debugging Details:
------------------
Could not read faulting driver name
READ_ADDRESS: GetPointerFromAddress: unable to read from fffff8000350e0e0
fffff8a20b80a6fc
FAULTING_IP:
Ntfs!NtfsCheckExistingFile+f9
fffff880`012c45a9 8b8bac000000 mov ecx,dword ptr [rbx+0ACh]
MM_INTERNAL_CODE: 5
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT
BUGCHECK_STR: 0x50
PROCESS_NAME: svchost.exe
CURRENT_IRQL: 0
TRAP_FRAME: fffff88009942520 -- (.trap 0xfffff88009942520)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=fffff8a00b80a6b0 rbx=0000000000000000 rcx=00000000000000a0
rdx=fffffa80061d3b60 rsi=0000000000000000 rdi=0000000000000000
rip=fffff880012c45a9 rsp=fffff880099426b0 rbp=0000000000000000
r8=0000000000000001 r9=0000000000000000 r10=fffff8800bfcefb0
r11=fffffa80061d3b60 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei ng nz na po cy
Ntfs!NtfsCheckExistingFile+0xf9:
fffff880`012c45a9 8b8bac000000 mov ecx,dword ptr [rbx+0ACh] ds:3cf0:00000000`000000ac=????????
Resetting default scope
LAST_CONTROL_TRANSFER: from fffff800033558c1 to fffff800032d6740
STACK_TEXT:
fffff880`099423b8 fffff800`033558c1 : 00000000`00000050 fffff8a2`0b80a6fc 00000000`00000000 fffff880`09942520 : nt!KeBugCheckEx
fffff880`099423c0 fffff800`032d482e : 00000000`00000000 fffff8a2`0b80a650 fffff880`03bae300 fffff880`010c2257 : nt! ?? ::FNODOBFM::`string'+0x40e8b
fffff880`09942520 fffff880`012c45a9 : fffffa80`05a85230 fffff880`0bfcebf0 fffff8a0`0b80a680 fffff8a0`06b77a90 : nt!KiPageFault+0x16e
fffff880`099426b0 fffff880`012c4d73 : fffff880`0bfcebf0 fffff8a0`0b80a680 00000000`00000002 fffff8a0`0c364201 : Ntfs!NtfsCheckExistingFile+0xf9
fffff880`09942740 fffff880`012c16ef : fffff880`0bfcebf0 00000000`00000000 00000000`0cea2140 fffff8a0`00000044 : Ntfs!NtfsOpenExistingAttr+0x73
fffff880`09942800 fffff880`012c1eff : fffffa80`05a85230 fffffa80`05e279d0 fffff8a0`0b80aac0 fffff880`00000044 : Ntfs!NtfsOpenAttributeInExistingFile+0x50f
fffff880`09942990 fffff880`012d2e76 : fffffa80`05a85230 fffffa80`05e279d0 fffff8a0`0b80aac0 00000000`00000701 : Ntfs!NtfsOpenExistingPrefixFcb+0x1ef
fffff880`09942a80 fffff880`012cd28d : fffffa80`05a85230 fffffa80`05e279d0 fffff880`09942c60 fffff880`09942ca8 : Ntfs!NtfsFindStartingNode+0x5e6
fffff880`09942b50 fffff880`01236c0d : fffffa80`05a85230 fffffa80`05e279d0 fffff880`0bfcebf0 fffffa80`061d3b00 : Ntfs!NtfsCommonCreate+0x3dd
fffff880`09942d30 fffff800`032ce5c7 : fffff880`0bfceb60 00000000`ffffffff 00000000`02ddf1e8 00000000`027af120 : Ntfs!NtfsCommonCreateCallout+0x1d
fffff880`09942d60 fffff800`032ce581 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KxSwitchKernelStackCallout+0x27
fffff880`0bfcea30 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSwitchKernelStackContinue
STACK_COMMAND: kb
FOLLOWUP_IP:
Ntfs!NtfsCheckExistingFile+f9
fffff880`012c45a9 8b8bac000000 mov ecx,dword ptr [rbx+0ACh]
SYMBOL_STACK_INDEX: 3
SYMBOL_NAME: Ntfs!NtfsCheckExistingFile+f9
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: Ntfs
IMAGE_NAME: Ntfs.sys
DEBUG_FLR_IMAGE_TIMESTAMP: 4a5bc14f
FAILURE_BUCKET_ID: X64_0x50_Ntfs!NtfsCheckExistingFile+f9
BUCKET_ID: X64_0x50_Ntfs!NtfsCheckExistingFile+f9
Followup: MachineOwner
---------
Microsoft (R) Windows Debugger Version 6.12.0002.633 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [F:\DMP\041611-30747-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
Symbol search path is: SRV*c:\websymbols*http://msdl.microsoft.com/download/symbols
Executable search path is:
Windows 7 Kernel Version 7600 MP (8 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS Personal
Built by: 7600.16695.amd64fre.win7_gdr.101026-1503
Machine Name:
Kernel base = 0xfffff800`03266000 PsLoadedModuleList = 0xfffff800`034a3e50
Debug session time: Sat Apr 16 15:30:04.980 2011 (UTC - 4:00)
System Uptime: 0 days 2:28:41.182
Loading Kernel Symbols
...............................................................
................................................................
....................................................
Loading User Symbols
Loading unloaded module list
..........
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
Use !analyze -v to get detailed debugging information.
BugCheck 1A, {41287, 38, 0, 0}
Probably caused by : ntkrnlmp.exe ( nt! ?? ::FNODOBFM::`string'+42ba5 )
Followup: MachineOwner
---------
2: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
MEMORY_MANAGEMENT (1a)
# Any other values for parameter 1 must be individually examined.
Arguments:
Arg1: 0000000000041287, The subtype of the bugcheck.
Arg2: 0000000000000038
Arg3: 0000000000000000
Arg4: 0000000000000000
Debugging Details:
------------------
BUGCHECK_STR: 0x1a_41287
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT
PROCESS_NAME: MsMpEng.exe
CURRENT_IRQL: 0
TRAP_FRAME: fffff880054b85b0 -- (.trap 0xfffff880054b85b0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=fffffa800c7704d0 rbx=0000000000000000 rcx=0000000000000000
rdx=fffff8a00eccc818 rsi=0000000000000000 rdi=0000000000000000
rip=fffff800033dc827 rsp=fffff880054b8740 rbp=fffffa800c6b2000
r8=fffffa800b8d0001 r9=fffffa800c70b048 r10=fffffa800c750450
r11=fffffa800c70cd20 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei ng nz na po nc
nt!MiEmptyPageAccessLog+0xe7:
fffff800`033dc827 8b4138 mov eax,dword ptr [rcx+38h] ds:fec8:00000000`00000038=????????
Resetting default scope
LAST_CONTROL_TRANSFER: from fffff80003282b7a to fffff800032d6740
STACK_TEXT:
fffff880`054b8448 fffff800`03282b7a : 00000000`0000001a 00000000`00041287 00000000`00000038 00000000`00000000 : nt!KeBugCheckEx
fffff880`054b8450 fffff800`032d482e : 00000000`00000000 00000000`00503001 fffff880`054b8600 fffff800`03510840 : nt! ?? ::FNODOBFM::`string'+0x42ba5
fffff880`054b85b0 fffff800`033dc827 : 00000000`00000000 fffffa80`0c750490 00000014`00000000 fffff680`00093000 : nt!KiPageFault+0x16e
fffff880`054b8740 fffff800`033dca80 : fffffa80`0b8dfb30 00000003`00000000 00000000`00000000 fffffa80`0c7704d0 : nt!MiEmptyPageAccessLog+0xe7
fffff880`054b87b0 fffff800`033dcc86 : fffffa80`0c70b000 9a400000`86875025 fffff680`000941d8 fffffa80`01b36d80 : nt!MiAllocateAccessLog+0x80
fffff880`054b87e0 fffff800`03349cfe : 00000003`00000000 fffffa80`019395f0 00000000`1283b000 9a400000`86875025 : nt!MiLogPageAccess+0x46
fffff880`054b8830 fffff800`03309df9 : 00000000`00000000 00000000`12888fff fffff880`00000000 00000000`00000000 : nt! ?? ::FNODOBFM::`string'+0x33652
fffff880`054b89f0 fffff800`035ed010 : fffffa80`059f91c0 0007ffff`00000000 fffffa80`0c7504d0 fffffa80`0c7504d0 : nt!MiRemoveMappedView+0xd9
fffff880`054b8b10 fffff800`035ed41b : 00000980`00000000 00000000`12260000 fffffa80`00000001 00000000`00000001 : nt!MiUnmapViewOfSection+0x1b0
fffff880`054b8bd0 fffff800`032d5993 : 00000000`00000000 00000000`00000df6 fffffa80`0b8dfb30 00000000`ca8d95d2 : nt!NtUnmapViewOfSection+0x5f
fffff880`054b8c20 00000000`77b0f95a : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x13
00000000`04c3dc28 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x77b0f95a
STACK_COMMAND: kb
FOLLOWUP_IP:
nt! ?? ::FNODOBFM::`string'+42ba5
fffff800`03282b7a cc int 3
SYMBOL_STACK_INDEX: 1
SYMBOL_NAME: nt! ?? ::FNODOBFM::`string'+42ba5
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: nt
IMAGE_NAME: ntkrnlmp.exe
DEBUG_FLR_IMAGE_TIMESTAMP: 4cc791bd
FAILURE_BUCKET_ID: X64_0x1a_41287_nt!_??_::FNODOBFM::_string_+42ba5
BUCKET_ID: X64_0x1a_41287_nt!_??_::FNODOBFM::_string_+42ba5
Followup: MachineOwner
---------
Microsoft (R) Windows Debugger Version 6.12.0002.633 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [F:\DMP\041611-24866-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
Symbol search path is: SRV*c:\websymbols*http://msdl.microsoft.com/download/symbols
Executable search path is:
Windows 7 Kernel Version 7600 MP (8 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS Personal
Built by: 7600.16695.amd64fre.win7_gdr.101026-1503
Machine Name:
Kernel base = 0xfffff800`0324f000 PsLoadedModuleList = 0xfffff800`0348ce50
Debug session time: Sat Apr 16 17:33:07.727 2011 (UTC - 4:00)
System Uptime: 0 days 0:33:29.929
Loading Kernel Symbols
...............................................................
................................................................
...................................................
Loading User Symbols
Loading unloaded module list
........
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
Use !analyze -v to get detailed debugging information.
BugCheck 50, {fffff8a20635af58, 1, fffff88010b8eb7d, 5}
Could not read faulting driver name
Probably caused by : dxgmms1.sys ( dxgmms1!VIDMM_GLOBAL::CloseLocalAllocation+135 )
Followup: MachineOwner
---------
5: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
PAGE_FAULT_IN_NONPAGED_AREA (50)
Invalid system memory was referenced. This cannot be protected by try-except,
it must be protected by a Probe. Typically the address is just plain bad or it
is pointing at freed memory.
Arguments:
Arg1: fffff8a20635af58, memory referenced.
Arg2: 0000000000000001, value 0 = read operation, 1 = write operation.
Arg3: fffff88010b8eb7d, If non-zero, the instruction address which referenced the bad memory
address.
Arg4: 0000000000000005, (reserved)
Debugging Details:
------------------
Could not read faulting driver name
WRITE_ADDRESS: GetPointerFromAddress: unable to read from fffff800034f70e0
fffff8a20635af58
FAULTING_IP:
dxgmms1!VIDMM_GLOBAL::CloseLocalAllocation+135
fffff880`10b8eb7d 488908 mov qword ptr [rax],rcx
MM_INTERNAL_CODE: 5
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT
BUGCHECK_STR: 0x50
PROCESS_NAME: dwm.exe
CURRENT_IRQL: 0
TRAP_FRAME: fffff880029240b0 -- (.trap 0xfffff880029240b0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=fffff8a20635af58 rbx=0000000000000000 rcx=fffff8a00635af58
rdx=0000000000000000 rsi=0000000000000000 rdi=0000000000000000
rip=fffff88010b8eb7d rsp=fffff88002924240 rbp=fffff8a00635ae50
r8=fffffa800c50ff30 r9=0000000000000090 r10=fffff88003088d00
r11=fffffa800638e770 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei pl zr na po nc
dxgmms1!VIDMM_GLOBAL::CloseLocalAllocation+0x135:
fffff880`10b8eb7d 488908 mov qword ptr [rax],rcx ds:3000:fffff8a2`0635af58=????????????????
Resetting default scope
LAST_CONTROL_TRANSFER: from fffff8000333e8c1 to fffff800032bf740
STACK_TEXT:
fffff880`02923f48 fffff800`0333e8c1 : 00000000`00000050 fffff8a2`0635af58 00000000`00000001 fffff880`029240b0 : nt!KeBugCheckEx
fffff880`02923f50 fffff800`032bd82e : 00000000`00000001 fffffa80`0c3c3f70 fffffa80`0638e700 fffff800`033f42dd : nt! ?? ::FNODOBFM::`string'+0x40e8b
fffff880`029240b0 fffff880`10b8eb7d : 00000000`00000000 fffffa80`0c3c3f70 fffffa80`00000001 fffff880`10ba8f09 : nt!KiPageFault+0x16e
fffff880`02924240 fffff880`10b89523 : fffffa80`0c3c3f70 00000000`00000001 fffff8a0`0635ae50 00000000`00000001 : dxgmms1!VIDMM_GLOBAL::CloseLocalAllocation+0x135
fffff880`029242f0 fffff880`10b6fecc : 00000000`00000000 00000000`00000000 fffffa80`05e8b8b0 00000000`00000000 : dxgmms1!VIDMM_GLOBAL::CloseOneAllocation+0x19b
fffff880`029243c0 fffff880`10ab1ccc : fffff8a0`0d029bb0 fffff8a0`0ddee000 fffff8a0`0ddee000 00000000`00000001 : dxgmms1!VidMmCloseAllocation+0x44
fffff880`029243f0 fffff880`10ab23ac : fffff8a0`0d029bb0 fffff8a0`05c4bf10 00000000`00000001 fffff8a0`0ddee000 : dxgkrnl!DXGDEVICE::DestroyAllocations+0x248
fffff880`029244e0 fffff880`10ab1651 : fffff8a0`0ddee000 fffff8a0`0ddee000 fffff8a0`01e667a0 00000000`00000000 : dxgkrnl!DXGDEVICE::DestroyResource+0x84
fffff880`02924510 fffff880`10adf74f : fffff8a0`0cd43090 fffff8a0`031d1820 fffff8a0`0cd43090 fffff880`02924930 : dxgkrnl!DXGDEVICE::ProcessTerminationList+0x95
fffff880`02924560 fffff880`10adee7b : fffff8a0`00000799 fffff8a0`0cd43090 fffff880`029248c0 fffff880`029248f0 : dxgkrnl!DXGCONTEXT::Present+0x2cb
fffff880`02924880 fffff960`001bc9b4 : fffffa80`05de3390 00000000`00000000 fffff8a0`0df95340 00000000`00000010 : dxgkrnl!DxgkPresent+0x543
fffff880`02924bf0 fffff800`032be993 : fffffa80`05de3390 00000000`03a7f960 000007fe`eec4d610 00000000`00000000 : win32k!NtGdiDdDDIPresent+0x18
fffff880`02924c20 000007fe`fdb613ca : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x13
00000000`03a7ea98 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x7fe`fdb613ca
STACK_COMMAND: kb
FOLLOWUP_IP:
dxgmms1!VIDMM_GLOBAL::CloseLocalAllocation+135
fffff880`10b8eb7d 488908 mov qword ptr [rax],rcx
SYMBOL_STACK_INDEX: 3
SYMBOL_NAME: dxgmms1!VIDMM_GLOBAL::CloseLocalAllocation+135
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: dxgmms1
IMAGE_NAME: dxgmms1.sys
DEBUG_FLR_IMAGE_TIMESTAMP: 4d3fa174
FAILURE_BUCKET_ID: X64_0x50_dxgmms1!VIDMM_GLOBAL::CloseLocalAllocation+135
BUCKET_ID: X64_0x50_dxgmms1!VIDMM_GLOBAL::CloseLocalAllocation+135
Followup: MachineOwner
---------