3: kd> .bugcheck
Bugcheck code 00000050
Arguments fffff880`0c83edc0 00000000`00000001 fffff880`04185f20 00000000`00000002
3: kd> !thread
GetPointerFromAddress: unable to read from fffff801e01dc000
THREAD fffffa80072d8080 Cid 0d60.06e4 Teb: 000000007f3a5000 Win32Thread: fffff9010260eb90 RUNNING on processor 3
Not impersonating
GetUlongFromAddress: unable to read from fffff801e00fbcf0
Owning Process fffffa80088df940 Image: chrome.exe
Attached Process N/A Image: N/A
fffff78000000000: Unable to get shared data
Wait Start TickCount 83473
Context Switch Count 5107 IdealProcessor: 3
ReadMemory error: Cannot get nt!KeMaximumIncrement value.
UserTime 00:00:00.000
KernelTime 00:00:00.000
Win32 Start Address 0x00000000624a7588
Stack Init fffff8800c5a0c90 Current fffff8800c5a06a0
Base fffff8800c5a1000 Limit fffff8800c59b000 Call 0
Priority 11 BasePriority 8 UnusualBoost 0 ForegroundBoost 2 IoPriority 2 PagePriority 5
Child-SP RetAddr : Args to Child : Call Site
fffff880`0c59e9c8 fffff801`dff9f57c : 00000000`00000050 fffff880`0c83edc0 00000000`00000001 fffff880`0c59ebb0 : nt!KeBugCheckEx
fffff880`0c59e9d0 fffff801`dff188eb : 00000000`00000001 fffff880`0c83edc0 fffffa80`072d8080 fffff880`0426c0d7 : nt! ?? ::FNODOBFM::`string'+0x33ec8
fffff880`0c59ea70 fffff801`dfedbcee : 00000000`00000001 fffffa80`09d5fa20 00000000`00000000 fffff880`0c59ebb0 : nt!MmAccessFault+0x55b
fffff880`0c59ebb0 fffff880`04185f20 : fffffa80`09d5fa00 fffffa80`09d5fa00 00000000`00000000 fffffa80`06c27010 : nt!KiPageFault+0x16e (TrapFrame @ fffff880`0c59ebb0)
fffff880`0c59ed40 fffffa80`09d5fa00 : fffffa80`09d5fa00 00000000`00000000 fffffa80`06c27010 fffff880`0c59f1a0 : nvlddmkm+0xcef20
fffff880`0c59ed48 fffffa80`09d5fa00 : 00000000`00000000 fffffa80`06c27010 fffff880`0c59f1a0 fffff880`0c59f194 : 0xfffffa80`09d5fa00
fffff880`0c59ed50 00000000`00000000 : fffffa80`06c27010 fffff880`0c59f1a0 fffff880`0c59f194 fffff8a0`01d1f2b0 : 0xfffffa80`09d5fa00
3: kd> .trap fffff880`0c59ebb0
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000000 rbx=0000000000000000 rcx=fffffa8007672010
rdx=0000000000000001 rsi=0000000000000000 rdi=0000000000000000
rip=fffff88004185f20 rsp=fffff8800c59ed40 rbp=fffff8800c59f260
r8=0000000000000001 r9=fffffa80099cd4d0 r10=0000000000000001
r11=fffffa8006967018 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei pl nz na pe nc
nvlddmkm+0xcef20:
fffff880`04185f20 88942480000000 mov byte ptr [rsp+80h],dl ss:0018:fffff880`0c59edc0=00
3: kd> kn
*** Stack trace for last set context - .thread/.cxr resets it
# Child-SP RetAddr Call Site
00 fffff880`0c59ed40 fffffa80`09d5fa00 nvlddmkm+0xcef20
01 fffff880`0c59ed48 fffffa80`09d5fa00 0xfffffa80`09d5fa00
02 fffff880`0c59ed50 00000000`00000000 0xfffffa80`09d5fa00
3: kd> u nvlddmkm+0xcef20
nvlddmkm+0xcef20:
fffff880`04185f20 88942480000000 mov byte ptr [rsp+80h],dl
fffff880`04185f27 4d85e4 test r12,r12
fffff880`04185f2a 7420 je nvlddmkm+0xcef4c (fffff880`04185f4c)
fffff880`04185f2c 84d2 test dl,dl
fffff880`04185f2e 0f8416020000 je nvlddmkm+0xcf14a (fffff880`0418614a)
fffff880`04185f34 41f74534ffff0100 test dword ptr [r13+34h],1FFFFh
fffff880`04185f3c 750e jne nvlddmkm+0xcef4c (fffff880`04185f4c)
fffff880`04185f3e 41f745340000feff test dword ptr [r13+34h],0FFFE0000h
3: kd> ub nvlddmkm+0xcef20
nvlddmkm+0xceefa:
fffff880`04185efa 488b8c2460040000 mov rcx,qword ptr [rsp+460h]
fffff880`04185f02 83b92004000002 cmp dword ptr [rcx+420h],2
fffff880`04185f09 ba01000000 mov edx,1
fffff880`04185f0e 89942458040000 mov dword ptr [rsp+458h],edx
fffff880`04185f15 7409 je nvlddmkm+0xcef20 (fffff880`04185f20)
fffff880`04185f17 40387138 cmp byte ptr [rcx+38h],sil
fffff880`04185f1b 7503 jne nvlddmkm+0xcef20 (fffff880`04185f20)
fffff880`04185f1d 408ad6 mov dl,sil
3: kd> lmvm nvlddmkm
start end module name
fffff880`040b7000 fffff880`04b5e000 nvlddmkm T (no symbols)
Loaded symbol image file: nvlddmkm.sys
Image path: \SystemRoot\system32\DRIVERS\nvlddmkm.sys
Image name: nvlddmkm.sys
Timestamp: Fri Jan 18 08:22:15 2013 (50F94C87)
CheckSum: 00A92B69
ImageSize: 00AA7000
Translations: 0000.04b0 0000.04e4 0409.04b0 0409.04e4