Use !analyze -v to get detailed debugging information.
BugCheck D1, {fffff8835b3fcb48, 2, 1, fffff880031dc11f}
Unable to load image \SystemRoot\system32\DRIVERS\nvlddmkm.sys, Win32 error 0n2
*** WARNING: Unable to verify timestamp for nvlddmkm.sys
*** ERROR: Module load completed but symbols could not be loaded for nvlddmkm.sys
Probably caused by : nvlddmkm.sys ( nvlddmkm+13511f )
Followup: MachineOwner
---------
1: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
DRIVER_IRQL_NOT_LESS_OR_EQUAL (d1)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high. This is usually
caused by drivers using improper addresses.
If kernel debugger is available get stack backtrace.
Arguments:
Arg1: fffff8835b3fcb48, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000001, value 0 = read operation, 1 = write operation
Arg4: fffff880031dc11f, address which referenced memory
Debugging Details:
------------------
WRITE_ADDRESS: GetPointerFromAddress: unable to read from fffff800ee131178
unable to get nt!MmPoolCodeStart
unable to get nt!MmPoolCodeEnd
fffff8835b3fcb48
CURRENT_IRQL: 2
FAULTING_IP:
nvlddmkm+13511f
fffff880`031dc11f 4c891cd0 mov qword ptr [rax+rdx*8],r11
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT
BUGCHECK_STR: 0xD1
PROCESS_NAME: System
TRAP_FRAME: fffff8800244a400 -- (.trap 0xfffff8800244a400)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=fffff8800ff48000 rbx=0000000000000000 rcx=fffffa8006dfab30
rdx=0000000069696969 rsi=0000000000000000 rdi=0000000000000000
rip=fffff880031dc11f rsp=fffff8800244a590 rbp=fffff8800244a5b0
r8=0000380f70025f80 r9=000000000000000f r10=0000000000000000
r11=0000380f70025f80 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei pl nz na pe nc
nvlddmkm+0x13511f:
fffff880`031dc11f 4c891cd0 mov qword ptr [rax+rdx*8],r11 ds:fffff883`5b3fcb48=????????????????
Resetting default scope
LAST_CONTROL_TRANSFER: from fffff800edfac529 to fffff800edfa1140
STACK_TEXT:
fffff880`0244a2b8 fffff800`edfac529 : 00000000`0000000a fffff883`5b3fcb48 00000000`00000002 00000000`00000001 : nt!KeBugCheckEx
fffff880`0244a2c0 fffff800`edfaada0 : 00000000`00000001 00000000`00000000 fffff880`0244a400 fffff880`031dc1ff : nt!KiBugCheckDispatch+0x69
fffff880`0244a400 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiPageFault+0x260
STACK_COMMAND: .bugcheck ; kb
FOLLOWUP_IP:
nvlddmkm+13511f
fffff880`031dc11f 4c891cd0 mov qword ptr [rax+rdx*8],r11
SYMBOL_NAME: nvlddmkm+13511f
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: nvlddmkm
IMAGE_NAME: nvlddmkm.sys
DEBUG_FLR_IMAGE_TIMESTAMP: 4f548b5c
FAILURE_BUCKET_ID: X64_0xD1_nvlddmkm+13511f
BUCKET_ID: X64_0xD1_nvlddmkm+13511f
Followup: MachineOwner