Microsoft (R) Windows Debugger Version 6.12.0002.633 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [F:\DMP\051111-53539-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
Symbol search path is: SRV*c:\websymbols*http://msdl.microsoft.com/download/symbols
Executable search path is:
Windows 7 Kernel Version 7600 MP (4 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS Personal
Built by: 7600.16695.amd64fre.win7_gdr.101026-1503
Machine Name:
Kernel base = 0xfffff800`03608000 PsLoadedModuleList = 0xfffff800`03845e50
Debug session time: Wed May 11 04:30:04.038 2011 (UTC - 4:00)
System Uptime: 1 days 13:47:08.240
Loading Kernel Symbols
...............................................................
................................................................
..............................
Loading User Symbols
Loading unloaded module list
...........................
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
Use !analyze -v to get detailed debugging information.
BugCheck 50, {ffffffff865ac040, 0, fffff88004b2192b, 5}
Unable to load image \SystemRoot\system32\DRIVERS\nvlddmkm.sys, Win32 error 0n2
*** WARNING: Unable to verify timestamp for nvlddmkm.sys
*** ERROR: Module load completed but symbols could not be loaded for nvlddmkm.sys
Could not read faulting driver name
Probably caused by : nvlddmkm.sys ( nvlddmkm+11292b )
Followup: MachineOwner
---------
2: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
PAGE_FAULT_IN_NONPAGED_AREA (50)
Invalid system memory was referenced. This cannot be protected by try-except,
it must be protected by a Probe. Typically the address is just plain bad or it
is pointing at freed memory.
Arguments:
Arg1: ffffffff865ac040, memory referenced.
Arg2: 0000000000000000, value 0 = read operation, 1 = write operation.
Arg3: fffff88004b2192b, If non-zero, the instruction address which referenced the bad memory
address.
Arg4: 0000000000000005, (reserved)
Debugging Details:
------------------
Could not read faulting driver name
READ_ADDRESS: GetPointerFromAddress: unable to read from fffff800038b00e0
ffffffff865ac040
FAULTING_IP:
nvlddmkm+11292b
fffff880`04b2192b 8b02 mov eax,dword ptr [rdx]
MM_INTERNAL_CODE: 5
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT
BUGCHECK_STR: 0x50
PROCESS_NAME: firefox.exe
CURRENT_IRQL: 0
TRAP_FRAME: fffff88007d673f0 -- (.trap 0xfffff88007d673f0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000000 rbx=0000000000000000 rcx=fffffa80081b7a50
rdx=ffffffff865ac040 rsi=0000000000000000 rdi=0000000000000000
rip=fffff88004b2192b rsp=fffff88007d67580 rbp=ffffffff865ac040
r8=ffffffff865ac640 r9=0000000000000000 r10=0000000000000000
r11=fffff88003163180 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei ng nz na pe nc
nvlddmkm+0x11292b:
fffff880`04b2192b 8b02 mov eax,dword ptr [rdx] ds:7690:ffffffff`865ac040=????????
Resetting default scope
LAST_CONTROL_TRANSFER: from fffff800036f78c1 to fffff80003678740
STACK_TEXT:
fffff880`07d67288 fffff800`036f78c1 : 00000000`00000050 ffffffff`865ac040 00000000`00000000 fffff880`07d673f0 : nt!KeBugCheckEx
fffff880`07d67290 fffff800`0367682e : 00000000`00000000 fffffa80`0941f000 fffff8a0`1172d100 fffff800`037ad2dd : nt! ?? ::FNODOBFM::`string'+0x40e8b
fffff880`07d673f0 fffff880`04b2192b : 00000000`00000000 00000000`00000000 fffff880`03163180 00000000`00000000 : nt!KiPageFault+0x16e
fffff880`07d67580 00000000`00000000 : 00000000`00000000 fffff880`03163180 00000000`00000000 fffffa80`081b7a50 : nvlddmkm+0x11292b
STACK_COMMAND: kb
FOLLOWUP_IP:
nvlddmkm+11292b
fffff880`04b2192b 8b02 mov eax,dword ptr [rdx]
SYMBOL_STACK_INDEX: 3
SYMBOL_NAME: nvlddmkm+11292b
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: nvlddmkm
IMAGE_NAME: nvlddmkm.sys
DEBUG_FLR_IMAGE_TIMESTAMP: 4bbc822c
FAILURE_BUCKET_ID: X64_0x50_nvlddmkm+11292b
BUCKET_ID: X64_0x50_nvlddmkm+11292b
Followup: MachineOwner
---------