Microsoft (R) Windows Debugger Version 6.12.0002.633 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [F:\a\Minidump\D M P\DMP\123110-15865-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
Symbol search path is: SRV*c:\websymbols*http://msdl.microsoft.com/download/symbols
Executable search path is:
Windows 7 Kernel Version 7600 MP (8 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS
Built by: 7600.16617.amd64fre.win7_gdr.100618-1621
Machine Name:
Kernel base = 0xfffff800`02e19000 PsLoadedModuleList = 0xfffff800`03056e50
Debug session time: Fri Dec 31 08:37:42.235 2010 (UTC - 5:00)
System Uptime: 0 days 0:18:13.281
Loading Kernel Symbols
...............................................................
................................................................
........................
Loading User Symbols
Loading unloaded module list
.....
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
Use !analyze -v to get detailed debugging information.
BugCheck D1, {ffffffffffffff89, 2, 1, fffff880059962c7}
Unable to load image \SystemRoot\system32\DRIVERS\nvlddmkm.sys, Win32 error 0n2
*** WARNING: Unable to verify timestamp for nvlddmkm.sys
*** ERROR: Module load completed but symbols could not be loaded for nvlddmkm.sys
Probably caused by : nvlddmkm.sys ( nvlddmkm+37d2c7 )
Followup: MachineOwner
---------
6: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
DRIVER_IRQL_NOT_LESS_OR_EQUAL (d1)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high. This is usually
caused by drivers using improper addresses.
If kernel debugger is available get stack backtrace.
Arguments:
Arg1: ffffffffffffff89, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000001, value 0 = read operation, 1 = write operation
Arg4: fffff880059962c7, address which referenced memory
Debugging Details:
------------------
WRITE_ADDRESS: GetPointerFromAddress: unable to read from fffff800030c10e0
ffffffffffffff89
CURRENT_IRQL: 2
FAULTING_IP:
nvlddmkm+37d2c7
fffff880`059962c7 c3 ret
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT
BUGCHECK_STR: 0xD1
PROCESS_NAME: plugin-contain
TRAP_FRAME: fffff88003126b60 -- (.trap 0xfffff88003126b60)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000000 rbx=0000000000000000 rcx=fffffa8006540000
rdx=fffffa80036f92b0 rsi=0000000000000000 rdi=0000000000000000
rip=fffff880059962c7 rsp=fffff88003126cf8 rbp=0000000000000000
r8=0000000000000000 r9=0000000000000004 r10=0000000000000001
r11=0000000000000000 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei ng nz na po nc
nvlddmkm+0x37d2c7:
fffff880`059962c7 c3 ret
Resetting default scope
LAST_CONTROL_TRANSFER: from fffff80002e88ca9 to fffff80002e89740
STACK_TEXT:
fffff880`03126a18 fffff800`02e88ca9 : 00000000`0000000a ffffffff`ffffff89 00000000`00000002 00000000`00000001 : nt!KeBugCheckEx
fffff880`03126a20 fffff800`02e87920 : 00000000`00000000 fffffa80`06540000 fffffa80`07212d90 fffff880`0480a7da : nt!KiBugCheckDispatch+0x69
fffff880`03126b60 fffff880`059962c7 : fffff880`057bd0ac fffffa80`06540000 00000000`00000000 00000000`00000002 : nt!KiPageFault+0x260
fffff880`03126cf8 fffff880`057bd0ac : fffffa80`06540000 00000000`00000000 00000000`00000002 00000000`00000002 : nvlddmkm+0x37d2c7
fffff880`03126d00 fffffa80`06540000 : 00000000`00000000 00000000`00000002 00000000`00000002 00000001`00000001 : nvlddmkm+0x1a40ac
fffff880`03126d08 00000000`00000000 : 00000000`00000002 00000000`00000002 00000001`00000001 fffffa80`03a40660 : 0xfffffa80`06540000
STACK_COMMAND: kb
FOLLOWUP_IP:
nvlddmkm+37d2c7
fffff880`059962c7 c3 ret
SYMBOL_STACK_INDEX: 3
SYMBOL_NAME: nvlddmkm+37d2c7
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: nvlddmkm
IMAGE_NAME: nvlddmkm.sys
DEBUG_FLR_IMAGE_TIMESTAMP: 4cb9dd0e
FAILURE_BUCKET_ID: X64_0xD1_nvlddmkm+37d2c7
BUCKET_ID: X64_0xD1_nvlddmkm+37d2c7
Followup: MachineOwner
---------
6: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
DRIVER_IRQL_NOT_LESS_OR_EQUAL (d1)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high. This is usually
caused by drivers using improper addresses.
If kernel debugger is available get stack backtrace.
Arguments:
Arg1: ffffffffffffff89, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000001, value 0 = read operation, 1 = write operation
Arg4: fffff880059962c7, address which referenced memory
Debugging Details:
------------------
WRITE_ADDRESS: ffffffffffffff89
CURRENT_IRQL: 2
FAULTING_IP:
nvlddmkm+37d2c7
fffff880`059962c7 c3 ret
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT
BUGCHECK_STR: 0xD1
PROCESS_NAME: plugin-contain
TRAP_FRAME: fffff88003126b60 -- (.trap 0xfffff88003126b60)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000000 rbx=0000000000000000 rcx=fffffa8006540000
rdx=fffffa80036f92b0 rsi=0000000000000000 rdi=0000000000000000
rip=fffff880059962c7 rsp=fffff88003126cf8 rbp=0000000000000000
r8=0000000000000000 r9=0000000000000004 r10=0000000000000001
r11=0000000000000000 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei ng nz na po nc
nvlddmkm+0x37d2c7:
fffff880`059962c7 c3 ret
Resetting default scope
LAST_CONTROL_TRANSFER: from fffff80002e88ca9 to fffff80002e89740
STACK_TEXT:
fffff880`03126a18 fffff800`02e88ca9 : 00000000`0000000a ffffffff`ffffff89 00000000`00000002 00000000`00000001 : nt!KeBugCheckEx
fffff880`03126a20 fffff800`02e87920 : 00000000`00000000 fffffa80`06540000 fffffa80`07212d90 fffff880`0480a7da : nt!KiBugCheckDispatch+0x69
fffff880`03126b60 fffff880`059962c7 : fffff880`057bd0ac fffffa80`06540000 00000000`00000000 00000000`00000002 : nt!KiPageFault+0x260
fffff880`03126cf8 fffff880`057bd0ac : fffffa80`06540000 00000000`00000000 00000000`00000002 00000000`00000002 : nvlddmkm+0x37d2c7
fffff880`03126d00 fffffa80`06540000 : 00000000`00000000 00000000`00000002 00000000`00000002 00000001`00000001 : nvlddmkm+0x1a40ac
fffff880`03126d08 00000000`00000000 : 00000000`00000002 00000000`00000002 00000001`00000001 fffffa80`03a40660 : 0xfffffa80`06540000
STACK_COMMAND: kb
FOLLOWUP_IP:
nvlddmkm+37d2c7
fffff880`059962c7 c3 ret
SYMBOL_STACK_INDEX: 3
SYMBOL_NAME: nvlddmkm+37d2c7
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: nvlddmkm
IMAGE_NAME: nvlddmkm.sys
DEBUG_FLR_IMAGE_TIMESTAMP: 4cb9dd0e
FAILURE_BUCKET_ID: X64_0xD1_nvlddmkm+37d2c7
BUCKET_ID: X64_0xD1_nvlddmkm+37d2c7
Followup: MachineOwner
---------