Microsoft (R) Windows Debugger Version 6.12.0002.633 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [F:\a\Minidump\D M P\DMP\010211-17269-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
Symbol search path is: SRV*c:\websymbols*http://msdl.microsoft.com/download/symbols
Executable search path is:
Windows 7 Kernel Version 7600 MP (2 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS Personal
Built by: 7600.16617.amd64fre.win7_gdr.100618-1621
Machine Name:
Kernel base = 0xfffff800`02c18000 PsLoadedModuleList = 0xfffff800`02e55e50
Debug session time: Sun Jan 2 08:58:28.454 2011 (UTC - 5:00)
System Uptime: 0 days 1:17:12.295
Loading Kernel Symbols
...............................................................
................................................................
.........................................
Loading User Symbols
Loading unloaded module list
........
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
Use !analyze -v to get detailed debugging information.
BugCheck D1, {6490, 5, 0, fffff880049ae619}
Unable to load image \SystemRoot\system32\DRIVERS\nvlddmkm.sys, Win32 error 0n2
*** WARNING: Unable to verify timestamp for nvlddmkm.sys
*** ERROR: Module load completed but symbols could not be loaded for nvlddmkm.sys
Probably caused by : nvlddmkm.sys ( nvlddmkm+1a7619 )
Followup: MachineOwner
---------
0: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
DRIVER_IRQL_NOT_LESS_OR_EQUAL (d1)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high. This is usually
caused by drivers using improper addresses.
If kernel debugger is available get stack backtrace.
Arguments:
Arg1: 0000000000006490, memory referenced
Arg2: 0000000000000005, IRQL
Arg3: 0000000000000000, value 0 = read operation, 1 = write operation
Arg4: fffff880049ae619, address which referenced memory
Debugging Details:
------------------
READ_ADDRESS: GetPointerFromAddress: unable to read from fffff80002ec00e0
0000000000006490
CURRENT_IRQL: 5
FAULTING_IP:
nvlddmkm+1a7619
fffff880`049ae619 41ff942490000000 call qword ptr [r12+90h]
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT
BUGCHECK_STR: 0xD1
PROCESS_NAME: System
TRAP_FRAME: fffff80000b9c600 -- (.trap 0xfffff80000b9c600)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000000 rbx=0000000000000000 rcx=0000000034800000
rdx=0000000000006475 rsi=0000000000000000 rdi=0000000000000000
rip=fffff880049ae619 rsp=fffff80000b9c790 rbp=0000000000000000
r8=0000000000006400 r9=0000000000000000 r10=0000000000000001
r11=fffff80000b9c710 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei pl nz na pe nc
nvlddmkm+0x1a7619:
fffff880`049ae619 41ff942490000000 call qword ptr [r12+90h] ds:00000000`00000090=????????????????
Resetting default scope
LAST_CONTROL_TRANSFER: from fffff80002c87ca9 to fffff80002c88740
STACK_TEXT:
fffff800`00b9c4b8 fffff800`02c87ca9 : 00000000`0000000a 00000000`00006490 00000000`00000005 00000000`00000000 : nt!KeBugCheckEx
fffff800`00b9c4c0 fffff800`02c86920 : fffffa80`0695a000 00000000`00b9c790 00000000`00000000 fffff880`049d3687 : nt!KiBugCheckDispatch+0x69
fffff800`00b9c600 fffff880`049ae619 : fffffa80`0869f000 fffffa80`0869f000 00000000`00000002 00000000`00000001 : nt!KiPageFault+0x260
fffff800`00b9c790 fffffa80`0869f000 : fffffa80`0869f000 00000000`00000002 00000000`00000001 00000000`00610024 : nvlddmkm+0x1a7619
fffff800`00b9c798 fffffa80`0869f000 : 00000000`00000002 00000000`00000001 00000000`00610024 fffffa80`0869f000 : 0xfffffa80`0869f000
fffff800`00b9c7a0 00000000`00000002 : 00000000`00000001 00000000`00610024 fffffa80`0869f000 fffffa80`067d03a0 : 0xfffffa80`0869f000
fffff800`00b9c7a8 00000000`00000001 : 00000000`00610024 fffffa80`0869f000 fffffa80`067d03a0 fffff880`04a1c16a : 0x2
fffff800`00b9c7b0 00000000`00610024 : fffffa80`0869f000 fffffa80`067d03a0 fffff880`04a1c16a fffffa80`0869ffd0 : 0x1
fffff800`00b9c7b8 fffffa80`0869f000 : fffffa80`067d03a0 fffff880`04a1c16a fffffa80`0869ffd0 fffffa80`0869fe48 : 0x610024
fffff800`00b9c7c0 fffffa80`067d03a0 : fffff880`04a1c16a fffffa80`0869ffd0 fffffa80`0869fe48 fffffa80`067d03a0 : 0xfffffa80`0869f000
fffff800`00b9c7c8 fffff880`04a1c16a : fffffa80`0869ffd0 fffffa80`0869fe48 fffffa80`067d03a0 fffffa80`06a90950 : 0xfffffa80`067d03a0
fffff800`00b9c7d0 fffffa80`0869ffd0 : fffffa80`0869fe48 fffffa80`067d03a0 fffffa80`06a90950 fffffa80`0685b320 : nvlddmkm+0x21516a
fffff800`00b9c7d8 fffffa80`0869fe48 : fffffa80`067d03a0 fffffa80`06a90950 fffffa80`0685b320 00000000`00000006 : 0xfffffa80`0869ffd0
fffff800`00b9c7e0 fffffa80`067d03a0 : fffffa80`06a90950 fffffa80`0685b320 00000000`00000006 fffff800`02e10c40 : 0xfffffa80`0869fe48
fffff800`00b9c7e8 fffffa80`06a90950 : fffffa80`0685b320 00000000`00000006 fffff800`02e10c40 fffffa80`068693b0 : 0xfffffa80`067d03a0
fffff800`00b9c7f0 fffffa80`0685b320 : 00000000`00000006 fffff800`02e10c40 fffffa80`068693b0 00000436`8a385a30 : 0xfffffa80`06a90950
fffff800`00b9c7f8 00000000`00000006 : fffff800`02e10c40 fffffa80`068693b0 00000436`8a385a30 00000437`016dee30 : 0xfffffa80`0685b320
fffff800`00b9c800 fffff800`02e10c40 : fffffa80`068693b0 00000436`8a385a30 00000437`016dee30 00000436`8a385a30 : 0x6
fffff800`00b9c808 fffffa80`068693b0 : 00000436`8a385a30 00000437`016dee30 00000436`8a385a30 00000437`016dee30 : nt!KiInitialThread
fffff800`00b9c810 00000436`8a385a30 : 00000437`016dee30 00000436`8a385a30 00000437`016dee30 00000000`00000000 : 0xfffffa80`068693b0
fffff800`00b9c818 00000437`016dee30 : 00000436`8a385a30 00000437`016dee30 00000000`00000000 00000000`00000000 : 0x436`8a385a30
fffff800`00b9c820 00000436`8a385a30 : 00000437`016dee30 00000000`00000000 00000000`00000000 00000000`00000000 : 0x437`016dee30
fffff800`00b9c828 00000437`016dee30 : 00000000`00000000 00000000`00000000 00000000`00000000 fffffa80`09dd6bb8 : 0x436`8a385a30
fffff800`00b9c830 00000000`00000000 : 00000000`00000000 00000000`00000000 fffffa80`09dd6bb8 00000000`00000000 : 0x437`016dee30
STACK_COMMAND: kb
FOLLOWUP_IP:
nvlddmkm+1a7619
fffff880`049ae619 41ff942490000000 call qword ptr [r12+90h]
SYMBOL_STACK_INDEX: 3
SYMBOL_NAME: nvlddmkm+1a7619
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: nvlddmkm
IMAGE_NAME: nvlddmkm.sys
DEBUG_FLR_IMAGE_TIMESTAMP: 4cb9dd0e
FAILURE_BUCKET_ID: X64_0xD1_nvlddmkm+1a7619
BUCKET_ID: X64_0xD1_nvlddmkm+1a7619
Followup: MachineOwner
---------