Microsoft (R) Windows Debugger Version 6.11.0001.404 X86
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [031810-10998-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
Symbol search path is: SRV*c:\temp\symbols*http://msdl.microsoft.com/download/symbols
Executable search path is:
Windows 7 Kernel Version 7600 MP (8 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS Personal
Built by: 7600.16385.amd64fre.win7_rtm.090713-1255
Machine Name:
Kernel base = 0xfffff800`02a50000 PsLoadedModuleList = 0xfffff800`02c8de50
Debug session time: Thu Mar 18 14:06:30.651 2010 (GMT+0)
System Uptime: 0 days 0:09:47.680
Loading Kernel Symbols
...............................................................
................................................................
................
Loading User Symbols
Loading unloaded module list
...............
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
Use !analyze -v to get detailed debugging information.
BugCheck D1, {fffffa880a88be18, 6, 0, fffff8800108168a}
Unable to load image \SystemRoot\system32\DRIVERS\mv91xx.sys, Win32 error 0n2
*** WARNING: Unable to verify timestamp for mv91xx.sys
*** ERROR: Module load completed but symbols could not be loaded for mv91xx.sys
Unable to load image \SystemRoot\system32\DRIVERS\nvlddmkm.sys, Win32 error 0n2
*** WARNING: Unable to verify timestamp for nvlddmkm.sys
*** ERROR: Module load completed but symbols could not be loaded for nvlddmkm.sys
Probably caused by : mv91xx.sys ( mv91xx+3868a )
Followup: MachineOwner
---------
6: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
DRIVER_IRQL_NOT_LESS_OR_EQUAL (d1)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high. This is usually
caused by drivers using improper addresses.
If kernel debugger is available get stack backtrace.
Arguments:
Arg1: fffffa880a88be18, memory referenced
Arg2: 0000000000000006, IRQL
Arg3: 0000000000000000, value 0 = read operation, 1 = write operation
Arg4: fffff8800108168a, address which referenced memory
Debugging Details:
------------------
READ_ADDRESS: GetPointerFromAddress: unable to read from fffff80002cf80e0
fffffa880a88be18
CURRENT_IRQL: 6
FAULTING_IP:
mv91xx+3868a
fffff880`0108168a 488b34c8 mov rsi,qword ptr [rax+rcx*8]
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT
BUGCHECK_STR: 0xD1
PROCESS_NAME: System
TRAP_FRAME: fffff88003121830 -- (.trap 0xfffff88003121830)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=fffffa800a88be20 rbx=0000000000000000 rcx=00000000ffffffff
rdx=fffffa800a88b958 rsi=0000000000000000 rdi=0000000000000000
rip=fffff8800108168a rsp=fffff880031219c0 rbp=fffffa800a88a801
r8=fffff88003726900 r9=0000000000000001 r10=fffffa800a8abe18
r11=fffffa800a88a8a8 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei pl zr na pe nc
mv91xx+0x3868a:
fffff880`0108168a 488b34c8 mov rsi,qword ptr [rax+rcx*8] ds:74c8:fffffa88`0a88be18=????????????????
Resetting default scope
LAST_CONTROL_TRANSFER: from fffff80002ac1469 to fffff80002ac1f00
STACK_TEXT:
fffff880`031216e8 fffff800`02ac1469 : 00000000`0000000a fffffa88`0a88be18 00000000`00000006 00000000`00000000 : nt!KeBugCheckEx
fffff880`031216f0 fffff800`02ac00e0 : 00000000`00000001 fffffa80`0a88b984 fffffa80`0b74d628 fffff880`05a0df1d : nt!KiBugCheckDispatch+0x69
fffff880`03121830 fffff880`0108168a : fffffa80`0a88b984 fffff880`0377c020 fffffa80`0b74d000 fffffa80`09d823e0 : nt!KiPageFault+0x260
fffff880`031219c0 fffffa80`0a88b984 : fffff880`0377c020 fffffa80`0b74d000 fffffa80`09d823e0 fffffa80`0ae169a0 : mv91xx+0x3868a
fffff880`031219c8 fffff880`0377c020 : fffffa80`0b74d000 fffffa80`09d823e0 fffffa80`0ae169a0 fffff880`05d176b7 : 0xfffffa80`0a88b984
fffff880`031219d0 fffffa80`0b74d000 : fffffa80`09d823e0 fffffa80`0ae169a0 fffff880`05d176b7 fffff880`03726900 : 0xfffff880`0377c020
fffff880`031219d8 fffffa80`09d823e0 : fffffa80`0ae169a0 fffff880`05d176b7 fffff880`03726900 fffffa80`0a8abda0 : 0xfffffa80`0b74d000
fffff880`031219e0 fffffa80`0ae169a0 : fffff880`05d176b7 fffff880`03726900 fffffa80`0a8abda0 fffffa80`0a8a74c8 : 0xfffffa80`09d823e0
fffff880`031219e8 fffff880`05d176b7 : fffff880`03726900 fffffa80`0a8abda0 fffffa80`0a8a74c8 fffffa80`0b74d000 : 0xfffffa80`0ae169a0
fffff880`031219f0 fffff880`03726900 : fffffa80`0a8abda0 fffffa80`0a8a74c8 fffffa80`0b74d000 00000000`00000000 : nvlddmkm+0x4966b7
fffff880`031219f8 fffffa80`0a8abda0 : fffffa80`0a8a74c8 fffffa80`0b74d000 00000000`00000000 00000000`00000000 : 0xfffff880`03726900
fffff880`03121a00 fffffa80`0a8a74c8 : fffffa80`0b74d000 00000000`00000000 00000000`00000000 fffffa80`0ad5b900 : 0xfffffa80`0a8abda0
fffff880`03121a08 fffffa80`0b74d000 : 00000000`00000000 00000000`00000000 fffffa80`0ad5b900 fffff880`03726900 : 0xfffffa80`0a8a74c8
fffff880`03121a10 00000000`00000000 : 00000000`00000000 fffffa80`0ad5b900 fffff880`03726900 00000000`44000008 : 0xfffffa80`0b74d000
STACK_COMMAND: kb
FOLLOWUP_IP:
mv91xx+3868a
fffff880`0108168a 488b34c8 mov rsi,qword ptr [rax+rcx*8]
SYMBOL_STACK_INDEX: 3
SYMBOL_NAME: mv91xx+3868a
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: mv91xx
IMAGE_NAME: mv91xx.sys
DEBUG_FLR_IMAGE_TIMESTAMP: 4acf09d5
FAILURE_BUCKET_ID: X64_0xD1_mv91xx+3868a
BUCKET_ID: X64_0xD1_mv91xx+3868a
Followup: MachineOwner
---------