STOP 0x333

Anyone have any info on this STOP code?
I first encountered it here:
http://www.techsupportforum.com/microsoft-support/windows-vista-windows-7-support/458588-bsod-help-analyzing-minidump-files.html#post2577030
Found another one here (in Italian or Portugese I think): http://www.dragteam.info/forum/duvidas-e-problemas/102198-ecral-azul-windows-7-a.html

Copyright (c) Microsoft Corporation. All rights reserved.  
  
Loading Dump File [C:\Users\Devin\Downloads\TSF\mbarrett34\013110-26488-01.dmp]  
Mini Kernel Dump File: Only registers and stack trace are available  
  
Symbol search path is: SRV\*c:\websymbols\*http://msdl.microsoft.com/download/symbols  
Executable search path is:   
Windows 7 Kernel Version 7600 MP (4 procs) Free x64  
Product: WinNt, suite: TerminalServer SingleUserTS Personal  
Built by: 7600.16385.amd64fre.win7_rtm.090713-1255  
Machine Name:  
Kernel base = 0xfffff800`02c55000 PsLoadedModuleList = 0xfffff800`02e92e50  
Debug session time: Sun Jan 31 19:16:24.663 2010 (GMT-5)  
System Uptime: 0 days 19:28:47.177  
Loading Kernel Symbols  
...............................................................  
................................................................  
.................  
Loading User Symbols  
Loading unloaded module list  
......................  
Unable to load image \SystemRoot\system32\DRIVERS\nvlddmkm.sys, Win32 error 0n2  
\*\*\* WARNING: Unable to verify timestamp for nvlddmkm.sys  
\*\*\* ERROR: Module load completed but symbols could not be loaded for nvlddmkm.sys  
\*\*\*\*\*\*\*\*\*\*\*\*\*\*\*\*\*\*\*\*\*\*\*\*\*\*\*\*\*\*\*\*\*\*\*\*\*\*\*\*\*\*\*\*\*\*\*\*\*\*\*\*\*\*\*\*\*\*\*\*\*\*\*\*\*\*\*\*\*\*\*\*\*\*\*\*\*\*\*  
\* \*  
\* Bugcheck Analysis \*  
\* \*  
\*\*\*\*\*\*\*\*\*\*\*\*\*\*\*\*\*\*\*\*\*\*\*\*\*\*\*\*\*\*\*\*\*\*\*\*\*\*\*\*\*\*\*\*\*\*\*\*\*\*\*\*\*\*\*\*\*\*\*\*\*\*\*\*\*\*\*\*\*\*\*\*\*\*\*\*\*\*\*  
  
Use !analyze -v to get detailed debugging information.  
  
BugCheck 333, {1, 2, 3, 4}  
  
Probably caused by : nvlddmkm.sys ( nvlddmkm+7df0c )  
  
Followup: MachineOwner  
---------  
  
0: kd\> !analyze -v  
\*\*\*\*\*\*\*\*\*\*\*\*\*\*\*\*\*\*\*\*\*\*\*\*\*\*\*\*\*\*\*\*\*\*\*\*\*\*\*\*\*\*\*\*\*\*\*\*\*\*\*\*\*\*\*\*\*\*\*\*\*\*\*\*\*\*\*\*\*\*\*\*\*\*\*\*\*\*\*  
\* \*  
\* Bugcheck Analysis \*  
\* \*  
\*\*\*\*\*\*\*\*\*\*\*\*\*\*\*\*\*\*\*\*\*\*\*\*\*\*\*\*\*\*\*\*\*\*\*\*\*\*\*\*\*\*\*\*\*\*\*\*\*\*\*\*\*\*\*\*\*\*\*\*\*\*\*\*\*\*\*\*\*\*\*\*\*\*\*\*\*\*\*  
  
Unknown bugcheck code (333)  
Unknown bugcheck description  
Arguments:  
Arg1: 0000000000000001  
Arg2: 0000000000000002  
Arg3: 0000000000000003  
Arg4: 0000000000000004  
  
Debugging Details:  
------------------  
  
CUSTOMER_CRASH_COUNT: 1  
  
DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT  
  
BUGCHECK_STR: 0x333  
  
PROCESS_NAME: csrss.exe  
  
CURRENT_IRQL: 0  
  
LAST_CONTROL_TRANSFER: from fffff8800fe88f0c to fffff80002cc6f00  
  
STACK_TEXT:   
fffff880`03acc1c8 fffff880`0fe88f0c : 00000000`00000333 00000000`00000001 00000000`00000002 00000000`00000003 : nt!KeBugCheckEx  
fffff880`03acc1d0 00000000`00000333 : 00000000`00000001 00000000`00000002 00000000`00000003 00000000`00000004 : nvlddmkm+0x7df0c  
fffff880`03acc1d8 00000000`00000001 : 00000000`00000002 00000000`00000003 00000000`00000004 fffff880`0fe8250f : 0x333  
fffff880`03acc1e0 00000000`00000002 : 00000000`00000003 00000000`00000004 fffff880`0fe8250f 00000000`00000028 : 0x1  
fffff880`03acc1e8 00000000`00000003 : 00000000`00000004 fffff880`0fe8250f 00000000`00000028 fffff880`0fe2fb6c : 0x2  
fffff880`03acc1f0 00000000`00000004 : fffff880`0fe8250f 00000000`00000028 fffff880`0fe2fb6c 00000000`00000100 : 0x3  
fffff880`03acc1f8 fffff880`0fe8250f : 00000000`00000028 fffff880`0fe2fb6c 00000000`00000100 00000000`00000080 : 0x4  
fffff880`03acc200 00000000`00000028 : fffff880`0fe2fb6c 00000000`00000100 00000000`00000080 00000000`00449747 : nvlddmkm+0x7750f  
fffff880`03acc208 fffff880`0fe2fb6c : 00000000`00000100 00000000`00000080 00000000`00449747 fffff800`02df94d3 : 0x28  
fffff880`03acc210 00000000`00000100 : 00000000`00000080 00000000`00449747 fffff800`02df94d3 fffff880`05bcc000 : nvlddmkm+0x24b6c  
fffff880`03acc218 00000000`00000080 : 00000000`00449747 fffff800`02df94d3 fffff880`05bcc000 fffff880`0fe8c161 : 0x100  
fffff880`03acc220 00000000`00449747 : fffff800`02df94d3 fffff880`05bcc000 fffff880`0fe8c161 02340250`0250026c : 0x80  
fffff880`03acc228 fffff800`02df94d3 : fffff880`05bcc000 fffff880`0fe8c161 02340250`0250026c fffff880`3fffffff : 0x449747  
fffff880`03acc230 fffffa80`03e65880 : ffffffff`ffffffff fffff880`1054b680 00000000`00000000 fffffa80`03e65d40 : nt!ExAllocatePoolWithTag+0x103  
fffff880`03acc320 ffffffff`ffffffff : fffff880`1054b680 00000000`00000000 fffffa80`03e65d40 00000000`00000000 : 0xfffffa80`03e65880  
fffff880`03acc328 fffff880`1054b680 : 00000000`00000000 fffffa80`03e65d40 00000000`00000000 00000000`000001eb : 0xffffffff`ffffffff  
fffff880`03acc330 00000000`00000000 : fffffa80`03e65d40 00000000`00000000 00000000`000001eb 00000000`000001e4 : nvlddmkm+0x740680  
  
STACK_COMMAND: kb  
  
FOLLOWUP_IP:   
nvlddmkm+7df0c  
fffff880`0fe88f0c ?? ???  
  
SYMBOL_STACK_INDEX: 1  
  
SYMBOL_NAME: nvlddmkm+7df0c  
  
FOLLOWUP_NAME: MachineOwner  
  
MODULE_NAME: nvlddmkm  
  
IMAGE_NAME: nvlddmkm.sys  
  
DEBUG_FLR_IMAGE_TIMESTAMP: 4b4c080b  
  
FAILURE_BUCKET_ID: X64_0x333_nvlddmkm+7df0c  
  
BUCKET_ID: X64_0x333_nvlddmkm+7df0c  
  
Followup: MachineOwner  
---------  
  
0: kd\> r  
rax=000000003fffffff rbx=fffffa80061f6028 rcx=0000000000000333  
rdx=0000000000000001 rsi=fffffa80061f6000 rdi=0000000000000008  
rip=fffff80002cc6f00 rsp=fffff88003acc1c8 rbp=00000000ffffffff  
 r8=0000000000000002 r9=0000000000000003 r10=0000000000000000  
r11=0000000000000102 r12=0000000000000000 r13=0000000000000000  
r14=0000000000000000 r15=0000000000000006  
iopl=0 nv up ei pl nz na pe nc  
cs=0010 ss=0018 ds=002b es=002b fs=0053 gs=002b efl=00000202  
nt!KeBugCheckEx:  
fffff800`02cc6f00 48894c2408 mov qword ptr [rsp+8],rcx ss:0018:fffff880`03acc1d0=0000000000000333  
0: kd\> k  
Child-SP RetAddr Call Site  
fffff880`03acc1c8 fffff880`0fe88f0c nt!KeBugCheckEx  
fffff880`03acc1d0 00000000`00000333 nvlddmkm+0x7df0c  
fffff880`03acc1d8 00000000`00000001 0x333  
fffff880`03acc1e0 00000000`00000002 0x1  
fffff880`03acc1e8 00000000`00000003 0x2  
fffff880`03acc1f0 00000000`00000004 0x3  
fffff880`03acc1f8 fffff880`0fe8250f 0x4  
fffff880`03acc200 00000000`00000028 nvlddmkm+0x7750f  
fffff880`03acc208 fffff880`0fe2fb6c 0x28  
fffff880`03acc210 00000000`00000100 nvlddmkm+0x24b6c  
fffff880`03acc218 00000000`00000080 0x100  
fffff880`03acc220 00000000`00449747 0x80  
fffff880`03acc228 fffff800`02df94d3 0x449747  
fffff880`03acc230 fffffa80`03e65880 nt!ExAllocatePoolWithTag+0x103  
fffff880`03acc320 ffffffff`ffffffff 0xfffffa80`03e65880  
fffff880`03acc328 fffff880`1054b680 0xffffffff`ffffffff  
fffff880`03acc330 00000000`00000000 nvlddmkm+0x740680  
0: kd\> kv  
Child-SP RetAddr : Args to Child : Call Site  
fffff880`03acc1c8 fffff880`0fe88f0c : 00000000`00000333 00000000`00000001 00000000`00000002 00000000`00000003 : nt!KeBugCheckEx  
fffff880`03acc1d0 00000000`00000333 : 00000000`00000001 00000000`00000002 00000000`00000003 00000000`00000004 : nvlddmkm+0x7df0c  
fffff880`03acc1d8 00000000`00000001 : 00000000`00000002 00000000`00000003 00000000`00000004 fffff880`0fe8250f : 0x333  
fffff880`03acc1e0 00000000`00000002 : 00000000`00000003 00000000`00000004 fffff880`0fe8250f 00000000`00000028 : 0x1  
fffff880`03acc1e8 00000000`00000003 : 00000000`00000004 fffff880`0fe8250f 00000000`00000028 fffff880`0fe2fb6c : 0x2  
fffff880`03acc1f0 00000000`00000004 : fffff880`0fe8250f 00000000`00000028 fffff880`0fe2fb6c 00000000`00000100 : 0x3  
fffff880`03acc1f8 fffff880`0fe8250f : 00000000`00000028 fffff880`0fe2fb6c 00000000`00000100 00000000`00000080 : 0x4  
fffff880`03acc200 00000000`00000028 : fffff880`0fe2fb6c 00000000`00000100 00000000`00000080 00000000`00449747 : nvlddmkm+0x7750f  
fffff880`03acc208 fffff880`0fe2fb6c : 00000000`00000100 00000000`00000080 00000000`00449747 fffff800`02df94d3 : 0x28  
fffff880`03acc210 00000000`00000100 : 00000000`00000080 00000000`00449747 fffff800`02df94d3 fffff880`05bcc000 : nvlddmkm+0x24b6c  
fffff880`03acc218 00000000`00000080 : 00000000`00449747 fffff800`02df94d3 fffff880`05bcc000 fffff880`0fe8c161 : 0x100  
fffff880`03acc220 00000000`00449747 : fffff800`02df94d3 fffff880`05bcc000 fffff880`0fe8c161 02340250`0250026c : 0x80  
fffff880`03acc228 fffff800`02df94d3 : fffff880`05bcc000 fffff880`0fe8c161 02340250`0250026c fffff880`3fffffff : 0x449747  
fffff880`03acc230 fffffa80`03e65880 : ffffffff`ffffffff fffff880`1054b680 00000000`00000000 fffffa80`03e65d40 : nt!ExAllocatePoolWithTag+0x103  
fffff880`03acc320 ffffffff`ffffffff : fffff880`1054b680 00000000`00000000 fffffa80`03e65d40 00000000`00000000 : 0xfffffa80`03e65880  
fffff880`03acc328 fffff880`1054b680 : 00000000`00000000 fffffa80`03e65d40 00000000`00000000 00000000`000001eb : 0xffffffff`ffffffff  
fffff880`03acc330 00000000`00000000 : fffffa80`03e65d40 00000000`00000000 00000000`000001eb 00000000`000001e4 : nvlddmkm+0x740680  
0: kd\> lmnts,  
 ^ Syntax error in 'lmnts,'  
0: kd\> lmntsm  
start end module name  
fffff880`10b73000 fffff880`10bb1000 1394ohci 1394ohci.sys Mon Jul 13 20:07:12 2009 (4A5BCC30)  
fffff880`00f6b000 fffff880`00fc2000 ACPI ACPI.sys Mon Jul 13 19:19:34 2009 (4A5BC106)  
fffff880`02ce3000 fffff880`02d6d000 afd afd.sys Mon Jul 13 19:21:40 2009 (4A5BC184)  
fffff880`10bb1000 fffff880`10bc7000 AgileVpn AgileVpn.sys Mon Jul 13 20:10:24 2009 (4A5BCCF0)  
fffff880`010ff000 fffff880`0110a000 amdxata amdxata.sys Tue May 19 13:56:59 2009 (4A12F2EB)  
fffff880`06db4000 fffff880`06dbf000 asyncmac asyncmac.sys Mon Jul 13 20:10:13 2009 (4A5BCCE5)  
fffff880`00e9b000 fffff880`00ea4000 atapi atapi.sys Mon Jul 13 19:19:47 2009 (4A5BC113)  
fffff880`00fd5000 fffff880`00fff000 ataport ataport.SYS Mon Jul 13 19:19:52 2009 (4A5BC118)  
fffff960`00960000 fffff960`009c1000 ATMFD ATMFD.DLL unavailable (00000000)  
fffff880`03ee4000 fffff880`03f51000 avgldx64 avgldx64.sys Sun Sep 20 11:04:15 2009 (4AB6446F)  
fffff880`03edd000 fffff880`03ee3bc0 avgmfx64 avgmfx64.sys Tue Oct 13 03:25:18 2009 (4AD42B5E)  
fffff880`02c29000 fffff880`02c9e000 avgtdia avgtdia.sys Mon Nov 02 08:26:13 2009 (4AEEDDF5)  
fffff880`0184f000 fffff880`01856000 Beep Beep.SYS Mon Jul 13 20:00:13 2009 (4A5BCA8D)  
fffff880`03ecc000 fffff880`03edd000 blbdrive blbdrive.sys Mon Jul 13 19:35:59 2009 (4A5BC4DF)  
fffff880`064cc000 fffff880`064ea000 bowser bowser.sys Mon Jul 13 19:23:50 2009 (4A5BC206)  
fffff960`00660000 fffff960`00687000 cdd cdd.dll unavailable (00000000)  
fffff880`0181c000 fffff880`01846000 cdrom cdrom.sys Mon Jul 13 19:19:54 2009 (4A5BC11A)  
fffff880`00cd1000 fffff880`00d91000 CI CI.dll Mon Jul 13 21:32:13 2009 (4A5BE01D)  
fffff880`019b6000 fffff880`019e6000 CLASSPNP CLASSPNP.SYS Mon Jul 13 19:19:58 2009 (4A5BC11E)  
fffff880`00c73000 fffff880`00cd1000 CLFS CLFS.SYS Mon Jul 13 19:19:57 2009 (4A5BC11D)  
fffff880`01000000 fffff880`01073000 cng cng.sys Mon Jul 13 19:49:40 2009 (4A5BC814)  
fffff880`041ea000 fffff880`041fa000 CompositeBus CompositeBus.sys Mon Jul 13 20:00:33 2009 (4A5BCAA1)  
fffff880`05ec6000 fffff880`05ed4000 crashdmp crashdmp.sys Mon Jul 13 20:01:01 2009 (4A5BCABD)  
fffff880`03eb1000 fffff880`03ecc000 ctxusbm ctxusbm.sys Mon Sep 07 14:09:28 2009 (4AA54C58)  
fffff880`03e93000 fffff880`03eb1000 dfsc dfsc.sys Mon Jul 13 19:23:44 2009 (4A5BC200)  
fffff880`03e84000 fffff880`03e93000 discache discache.sys Mon Jul 13 19:37:18 2009 (4A5BC52E)  
fffff880`019a0000 fffff880`019b6000 disk disk.sys Mon Jul 13 19:19:57 2009 (4A5BC11D)  
fffff880`05e92000 fffff880`05eb4000 drmk drmk.sys Mon Jul 13 21:01:25 2009 (4A5BD8E5)  
fffff880`05ee0000 fffff880`05ee9000 dump_atapi dump_atapi.sys Mon Jul 13 19:19:47 2009 (4A5BC113)  
fffff880`05ed4000 fffff880`05ee0000 dump_dumpata dump_dumpata.sys Mon Jul 13 19:19:47 2009 (4A5BC113)  
fffff880`05ee9000 fffff880`05efc000 dump_dumpfve dump_dumpfve.sys Mon Jul 13 19:21:51 2009 (4A5BC18F)  
fffff880`05eba000 fffff880`05ec6000 Dxapi Dxapi.sys Mon Jul 13 19:38:28 2009 (4A5BC574)  
fffff880`0400c000 fffff880`04100000 dxgkrnl dxgkrnl.sys Thu Oct 01 21:00:14 2009 (4AC5509E)  
fffff880`04100000 fffff880`04146000 dxgmms1 dxgmms1.sys Mon Jul 13 19:38:32 2009 (4A5BC578)  
fffff880`01156000 fffff880`0116a000 fileinfo fileinfo.sys Mon Jul 13 19:34:25 2009 (4A5BC481)  
fffff880`0110a000 fffff880`01156000 fltmgr fltmgr.sys Mon Jul 13 19:19:59 2009 (4A5BC11F)  
fffff880`0122b000 fffff880`01235000 Fs_Rec Fs_Rec.sys Mon Jul 13 19:19:45 2009 (4A5BC111)  
fffff880`01966000 fffff880`019a0000 fvevol fvevol.sys Mon Jul 13 19:22:15 2009 (4A5BC1A7)  
fffff880`0142b000 fffff880`01475000 fwpkclnt fwpkclnt.sys Mon Jul 13 19:21:08 2009 (4A5BC164)  
fffff800`02c0c000 fffff800`02c55000 hal hal.dll Mon Jul 13 21:27:36 2009 (4A5BDF08)  
fffff880`041ba000 fffff880`041de000 HDAudBus HDAudBus.sys Mon Jul 13 20:06:13 2009 (4A5BCBF5)  
fffff880`06c40000 fffff880`06c59000 HIDCLASS HIDCLASS.SYS Mon Jul 13 20:06:21 2009 (4A5BCBFD)  
fffff880`05f94000 fffff880`05f9c080 HIDPARSE HIDPARSE.SYS Mon Jul 13 20:06:17 2009 (4A5BCBF9)  
fffff880`06c32000 fffff880`06c40000 hidusb hidusb.sys Mon Jul 13 20:06:22 2009 (4A5BCBFE)  
fffff880`06404000 fffff880`064cc000 HTTP HTTP.sys Mon Jul 13 19:22:16 2009 (4A5BC1A8)  
fffff880`0195d000 fffff880`01966000 hwpolicy hwpolicy.sys Mon Jul 13 19:19:22 2009 (4A5BC0FA)  
fffff880`03f77000 fffff880`03f8d000 intelppm intelppm.sys Mon Jul 13 19:19:25 2009 (4A5BC0FD)  
fffff880`010b2000 fffff880`010d0000 jraid jraid.sys Thu Aug 13 04:10:27 2009 (4A83CA73)  
fffff880`10beb000 fffff880`10bfa000 kbdclass kbdclass.sys Mon Jul 13 19:19:50 2009 (4A5BC116)  
fffff880`06c59000 fffff880`06c67000 kbdhid kbdhid.sys Mon Jul 13 20:00:20 2009 (4A5BCA94)  
fffff800`00bb1000 fffff800`00bbb000 kdcom kdcom.dll Mon Jul 13 21:31:07 2009 (4A5BDFDB)  
fffff880`0447d000 fffff880`044c0000 ks ks.sys Mon Jul 13 20:00:31 2009 (4A5BCA9F)  
fffff880`01200000 fffff880`0121a000 ksecdd ksecdd.sys Mon Jul 13 19:20:54 2009 (4A5BC156)  
fffff880`01400000 fffff880`0142b000 ksecpkg ksecpkg.sys Mon Jul 13 19:50:34 2009 (4A5BC84A)  
fffff880`05eb4000 fffff880`05eb9200 ksthunk ksthunk.sys Mon Jul 13 20:00:19 2009 (4A5BCA93)  
fffff880`06c67000 fffff880`06c7a000 LHidFilt LHidFilt.Sys Wed Jun 17 12:49:39 2009 (4A391EA3)  
fffff880`05fdf000 fffff880`05ff4000 lltdio lltdio.sys Mon Jul 13 20:08:50 2009 (4A5BCC92)  
fffff880`06c87000 fffff880`06c9b000 LMouFilt LMouFilt.Sys Wed Jun 17 12:49:43 2009 (4A391EA7)  
fffff880`05f0a000 fffff880`05f2d000 luafv luafv.sys Mon Jul 13 19:26:13 2009 (4A5BC295)  
fffff880`00c1b000 fffff880`00c5f000 mcupdate_GenuineIntel mcupdate_GenuineIntel.dll Mon Jul 13 21:29:10 2009 (4A5BDF66)  
fffff880`05efc000 fffff880`05f0a000 monitor monitor.sys Mon Jul 13 19:38:52 2009 (4A5BC58C)  
fffff880`02c00000 fffff880`02c0f000 mouclass mouclass.sys Mon Jul 13 19:19:50 2009 (4A5BC116)  
fffff880`06c7a000 fffff880`06c87000 mouhid mouhid.sys Mon Jul 13 20:00:20 2009 (4A5BCA94)  
fffff880`00e81000 fffff880`00e9b000 mountmgr mountmgr.sys Mon Jul 13 19:19:54 2009 (4A5BC11A)  
fffff880`064ea000 fffff880`06502000 mpsdrv mpsdrv.sys Mon Jul 13 20:08:25 2009 (4A5BCC79)  
fffff880`06502000 fffff880`0652e000 mrxsmb mrxsmb.sys Mon Jul 13 19:23:59 2009 (4A5BC20F)  
fffff880`0652e000 fffff880`0657b000 mrxsmb10 mrxsmb10.sys Mon Jul 13 19:24:08 2009 (4A5BC218)  
fffff880`0657b000 fffff880`0659e000 mrxsmb20 mrxsmb20.sys Mon Jul 13 19:24:05 2009 (4A5BC215)  
fffff880`01475000 fffff880`01480000 Msfs Msfs.SYS Mon Jul 13 19:19:47 2009 (4A5BC113)  
fffff880`00fcb000 fffff880`00fd5000 msisadrv msisadrv.sys Mon Jul 13 19:19:26 2009 (4A5BC0FE)  
fffff880`0116a000 fffff880`011c8000 msrpc msrpc.sys Mon Jul 13 19:21:32 2009 (4A5BC17C)  
fffff880`03e79000 fffff880`03e84000 mssmbios mssmbios.sys Mon Jul 13 19:31:10 2009 (4A5BC3BE)  
fffff880`0194b000 fffff880`0195d000 mup mup.sys Mon Jul 13 19:23:45 2009 (4A5BC201)  
fffff880`0148e000 fffff880`01580000 ndis ndis.sys Mon Jul 13 19:21:40 2009 (4A5BC184)  
fffff880`04000000 fffff880`0400c000 ndistapi ndistapi.sys Mon Jul 13 20:10:00 2009 (4A5BCCD8)  
fffff880`03f8d000 fffff880`03fbc000 ndiswan ndiswan.sys Mon Jul 13 20:10:11 2009 (4A5BCCE3)  
fffff880`0452c000 fffff880`04541000 NDProxy NDProxy.SYS Mon Jul 13 20:10:05 2009 (4A5BCCDD)  
fffff880`02d9c000 fffff880`02dab000 netbios netbios.sys Mon Jul 13 20:09:26 2009 (4A5BCCB6)  
fffff880`02c9e000 fffff880`02ce3000 netbt netbt.sys Mon Jul 13 19:21:28 2009 (4A5BC178)  
fffff880`01580000 fffff880`015e0000 NETIO NETIO.SYS Mon Jul 13 19:21:46 2009 (4A5BC18A)  
fffff880`015e0000 fffff880`015f1000 Npfs Npfs.SYS Mon Jul 13 19:19:48 2009 (4A5BC114)  
fffff880`03e6d000 fffff880`03e79000 nsiproxy nsiproxy.sys Mon Jul 13 19:21:02 2009 (4A5BC15E)  
fffff800`02c55000 fffff800`03232000 nt ntkrnlmp.exe Mon Jul 13 19:40:48 2009 (4A5BC600)  
fffff880`01258000 fffff880`013fb000 Ntfs Ntfs.sys Mon Jul 13 19:20:47 2009 (4A5BC14F)  
fffff880`01846000 fffff880`0184f000 Null Null.SYS Mon Jul 13 19:19:37 2009 (4A5BC109)  
fffff880`10b32000 fffff880`10b33180 nvBridge nvBridge.kmd Mon Jan 11 23:58:35 2010 (4B4C017B)  
fffff880`0fe0b000 fffff880`10b31700 nvlddmkm nvlddmkm.sys Tue Jan 12 00:26:35 2010 (4B4C080B)  
fffff880`02d76000 fffff880`02d9c000 pacer pacer.sys Mon Jul 13 20:09:41 2009 (4A5BCCC5)  
fffff880`00e40000 fffff880`00e55000 partmgr partmgr.sys Mon Jul 13 19:19:58 2009 (4A5BC11E)  
fffff880`00e00000 fffff880`00e33000 pci pci.sys Mon Jul 13 19:19:51 2009 (4A5BC117)  
fffff880`00e6a000 fffff880`00e71000 pciide pciide.sys Mon Jul 13 19:19:49 2009 (4A5BC115)  
fffff880`00e71000 fffff880`00e81000 PCIIDEX PCIIDEX.SYS Mon Jul 13 19:19:48 2009 (4A5BC114)  
fffff880`0121a000 fffff880`0122b000 pcw pcw.sys Mon Jul 13 19:19:27 2009 (4A5BC0FF)  
fffff880`04541000 fffff880`045e7000 peauth peauth.sys Mon Jul 13 21:01:19 2009 (4A5BD8DF)  
fffff880`05e55000 fffff880`05e92000 portcls portcls.sys Mon Jul 13 20:06:27 2009 (4A5BCC03)  
fffff880`00c5f000 fffff880`00c73000 PSHED PSHED.dll Mon Jul 13 21:32:23 2009 (4A5BE027)  
fffff880`10bc7000 fffff880`10beb000 rasl2tp rasl2tp.sys Mon Jul 13 20:10:11 2009 (4A5BCCE3)  
fffff880`03fbc000 fffff880`03fd7000 raspppoe raspppoe.sys Mon Jul 13 20:10:17 2009 (4A5BCCE9)  
fffff880`03fd7000 fffff880`03ff8000 raspptp raspptp.sys Mon Jul 13 20:10:18 2009 (4A5BCCEA)  
fffff880`03e00000 fffff880`03e1a000 rassstp rassstp.sys Mon Jul 13 20:10:25 2009 (4A5BCCF1)  
fffff880`03e1c000 fffff880`03e6d000 rdbss rdbss.sys Mon Jul 13 19:24:09 2009 (4A5BC219)  
fffff880`01899000 fffff880`018a2000 RDPCDD RDPCDD.sys Mon Jul 13 20:16:34 2009 (4A5BCE62)  
fffff880`018a2000 fffff880`018ab000 rdpencdd rdpencdd.sys Mon Jul 13 20:16:34 2009 (4A5BCE62)  
fffff880`018ab000 fffff880`018b4000 rdprefmp rdprefmp.sys Mon Jul 13 20:16:35 2009 (4A5BCE63)  
fffff880`01911000 fffff880`0194b000 rdyboost rdyboost.sys Mon Jul 13 19:34:34 2009 (4A5BC48A)  
fffff880`05c00000 fffff880`05c18000 rspndr rspndr.sys Mon Jul 13 20:08:50 2009 (4A5BCC92)  
fffff880`10b34000 fffff880`10b73000 Rt64win7 Rt64win7.sys Thu Aug 20 12:05:06 2009 (4A8D7432)  
fffff880`05c37000 fffff880`05e54300 RTKVHD64 RTKVHD64.sys Tue Dec 08 05:20:05 2009 (4B1E2855)  
fffff880`010d0000 fffff880`010ff000 SCSIPORT SCSIPORT.SYS Mon Jul 13 20:01:04 2009 (4A5BCAC0)  
fffff880`0659e000 fffff880`065a9000 secdrv secdrv.SYS Wed Sep 13 09:18:38 2006 (4508052E)  
fffff880`041de000 fffff880`041ea000 serenum serenum.sys Mon Jul 13 20:00:33 2009 (4A5BCAA1)  
fffff880`02dab000 fffff880`02dc8000 serial serial.sys Mon Jul 13 20:00:40 2009 (4A5BCAA8)  
fffff880`01909000 fffff880`01911000 spldr spldr.sys Mon May 11 12:56:27 2009 (4A0858BB)  
fffff880`06cab000 fffff880`06d43000 srv srv.sys Mon Jul 13 19:25:11 2009 (4A5BC257)  
fffff880`04400000 fffff880`04469000 srv2 srv2.sys Mon Jul 13 19:25:02 2009 (4A5BC24E)  
fffff880`065a9000 fffff880`065d6000 srvnet srvnet.sys Mon Jul 13 19:24:58 2009 (4A5BC24A)  
fffff880`041fa000 fffff880`041fb480 swenum swenum.sys Mon Jul 13 20:00:18 2009 (4A5BCA92)  
fffff880`01603000 fffff880`01800000 tcpip tcpip.sys Mon Jul 13 19:25:34 2009 (4A5BC26E)  
fffff880`065d6000 fffff880`065e8000 tcpipreg tcpipreg.sys Mon Jul 13 20:09:49 2009 (4A5BCCCD)  
fffff880`015f1000 fffff880`015fe000 TDI TDI.SYS Mon Jul 13 19:21:18 2009 (4A5BC16E)  
fffff880`01235000 fffff880`01253000 tdx tdx.sys Mon Jul 13 19:21:15 2009 (4A5BC16B)  
fffff880`02de3000 fffff880`02df7000 termdd termdd.sys Mon Jul 13 20:16:36 2009 (4A5BCE64)  
fffff960`00490000 fffff960`0049a000 TSDDD TSDDD.dll unavailable (00000000)  
fffff880`03f51000 fffff880`03f77000 tunnel tunnel.sys Mon Jul 13 20:09:37 2009 (4A5BCCC1)  
fffff880`044c0000 fffff880`044d2000 umbus umbus.sys Mon Jul 13 20:06:56 2009 (4A5BCC20)  
fffff880`06c13000 fffff880`06c30000 usbccgp usbccgp.sys Mon Jul 13 20:06:45 2009 (4A5BCC15)  
fffff880`06c30000 fffff880`06c31f00 USBD USBD.SYS Mon Jul 13 20:06:23 2009 (4A5BCBFF)  
fffff880`041a9000 fffff880`041ba000 usbehci usbehci.sys Mon Jul 13 20:06:30 2009 (4A5BCC06)  
fffff880`044d2000 fffff880`0452c000 usbhub usbhub.sys Mon Jul 13 20:07:09 2009 (4A5BCC2D)  
fffff880`04153000 fffff880`041a9000 USBPORT USBPORT.SYS Mon Jul 13 20:06:31 2009 (4A5BCC07)  
fffff880`04146000 fffff880`04153000 usbuhci usbuhci.sys Mon Jul 13 20:06:27 2009 (4A5BCC03)  
fffff880`00e33000 fffff880`00e40000 vdrvroot vdrvroot.sys Mon Jul 13 20:01:31 2009 (4A5BCADB)  
fffff880`01856000 fffff880`01864000 vga vga.sys Mon Jul 13 19:38:47 2009 (4A5BC587)  
fffff880`01864000 fffff880`01889000 VIDEOPRT VIDEOPRT.SYS Mon Jul 13 19:38:51 2009 (4A5BC58B)  
fffff880`00e55000 fffff880`00e6a000 volmgr volmgr.sys Mon Jul 13 19:19:57 2009 (4A5BC11D)  
fffff880`00d91000 fffff880`00ded000 volmgrx volmgrx.sys Mon Jul 13 19:20:33 2009 (4A5BC141)  
fffff880`018bd000 fffff880`01909000 volsnap volsnap.sys Mon Jul 13 19:20:08 2009 (4A5BC128)  
fffff880`02dc8000 fffff880`02de3000 wanarp wanarp.sys Mon Jul 13 20:10:21 2009 (4A5BCCED)  
fffff880`01889000 fffff880`01899000 watchdog watchdog.sys Mon Jul 13 19:37:35 2009 (4A5BC53F)  
fffff880`00eb8000 fffff880`00f5c000 Wdf01000 Wdf01000.sys Mon Jul 13 19:22:07 2009 (4A5BC19F)  
fffff880`00f5c000 fffff880`00f6b000 WDFLDR WDFLDR.SYS Mon Jul 13 19:19:54 2009 (4A5BC11A)  
fffff880`02d6d000 fffff880`02d76000 wfplwf wfplwf.sys Mon Jul 13 20:09:26 2009 (4A5BCCB6)  
fffff960`000c0000 fffff960`003cf000 win32k win32k.sys Mon Jul 13 19:40:16 2009 (4A5BC5E0)  
fffff880`00fc2000 fffff880`00fcb000 WMILIB WMILIB.SYS Mon Jul 13 19:19:51 2009 (4A5BC117)  
fffff880`05f2d000 fffff880`05f4e000 WudfPf WudfPf.sys Mon Jul 13 20:05:37 2009 (4A5BCBD1)  
  
Unloaded modules:  
fffff880`06c9b000 fffff880`06ca7000 hiber_atapor  
 Timestamp: unavailable (00000000)  
 Checksum: 00000000  
fffff880`06d43000 fffff880`06d4c000 hiber_atapi.  
 Timestamp: unavailable (00000000)  
 Checksum: 00000000  
fffff880`06d4c000 fffff880`06d5f000 hiber_dumpfv  
 Timestamp: unavailable (00000000)  
 Checksum: 00000000  
fffff880`05fab000 fffff880`05fbe000 LHidFilt.Sys  
 Timestamp: unavailable (00000000)  
 Checksum: 00000000  
fffff880`05fcb000 fffff880`05fdf000 LMouFilt.Sys  
 Timestamp: unavailable (00000000)  
 Checksum: 00000000  
fffff880`05f6b000 fffff880`05f6d000 USBD.SYS  
 Timestamp: unavailable (00000000)  
 Checksum: 00000000  
fffff880`05f7b000 fffff880`05f94000 HIDCLASS.SYS  
 Timestamp: unavailable (00000000)  
 Checksum: 00000000  
fffff880`05f6d000 fffff880`05f7b000 hidusb.sys  
 Timestamp: unavailable (00000000)  
 Checksum: 00000000  
fffff880`05f4e000 fffff880`05f6b000 usbccgp.sys  
 Timestamp: unavailable (00000000)  
 Checksum: 00000000  
fffff880`05f9d000 fffff880`05fab000 kbdhid.sys  
 Timestamp: unavailable (00000000)  
 Checksum: 00000000  
fffff880`05fbe000 fffff880`05fcb000 mouhid.sys  
 Timestamp: unavailable (00000000)  
 Checksum: 00000000  
fffff880`06de7000 fffff880`06df3000 hiber_atapor  
 Timestamp: unavailable (00000000)  
 Checksum: 00000000  
fffff880`06df3000 fffff880`06dfc000 hiber_atapi.  
 Timestamp: unavailable (00000000)  
 Checksum: 00000000  
fffff880`06c00000 fffff880`06c13000 hiber_dumpfv  
 Timestamp: unavailable (00000000)  
 Checksum: 00000000  
fffff880`06dbf000 fffff880`06dcb000 hiber_atapor  
 Timestamp: unavailable (00000000)  
 Checksum: 00000000  
fffff880`06dcb000 fffff880`06dd4000 hiber_atapi.  
 Timestamp: unavailable (00000000)  
 Checksum: 00000000  
fffff880`06dd4000 fffff880`06de7000 hiber_dumpfv  
 Timestamp: unavailable (00000000)  
 Checksum: 00000000  
fffff880`06d43000 fffff880`06db4000 spsys.sys  
 Timestamp: unavailable (00000000)  
 Checksum: 00000000  
fffff880`019e6000 fffff880`019f4000 crashdmp.sys  
 Timestamp: unavailable (00000000)  
 Checksum: 00000000  
fffff880`019f4000 fffff880`01a00000 dump_ataport  
 Timestamp: unavailable (00000000)  
 Checksum: 00000000  
fffff880`01800000 fffff880`01809000 dump_atapi.s  
 Timestamp: unavailable (00000000)  
 Checksum: 00000000  
fffff880`01809000 fffff880`0181c000 dump_dumpfve  
 Timestamp: unavailable (00000000)  
 Checksum: 00000000```  
  
Thanks for any input!!!  
  
- John   
(aka usasma)

That’s probably custom bug check generated explicitly by nVidia WDDM driver. You can probably verify it by running “ub nvlddmkm+0x7df0c” in windbg/kd. If the last line of output is something like “call nt!KeBugCheckEx” then that’s pretty much it. If this is the case then I would contact nVidia to get further explanations.

Krzysztof Uchronski

Thanks Krzysztof Uchronski!

I also suspect that it is an nVidia bugcheck. There are 2 STOP 0x333 errors, a STOP 0x50, and a STOP 0x9F. All point to nvlddmkm being at fault.

Here’s what I get when I run the ub and the u commands in WinDbg:

0: kd> ub nvlddmkm+7df0c
^ Unable to find valid previous instruction for ‘ub nvlddmkm+7df0c’
0: kd> u nvlddmkm+0x7df0c
nvlddmkm+0x7df0c:
fffff880`0fe88f0c ?? ???
^ Memory access error in ‘u nvlddmkm+0x7df0c’

I wasn’t able to find a contact point at nVidia - the only thing I could find was a driver feedback link (and, as this isn’t my system, I don’t have access to the driver itself).

Thanks again!

  • John (aka usasma)

Is it a mini dump you are analysing? “Image file path” should be set to point where the binaries are. Anyway it’s actually much more useful to use kernel memory dumps instead.

As for the other two bugchecks it should be possible to make more sense than from 0x333 one. Bug check code 0x50 is PAGE_FAULT_IN_NONPAGED_AREA (quite common and usually means that some driver was trying to access invalid km address).
Bug check code 0x9f is DRIVER_POWER_STATE_FAILURE depending on what’s the value of its first parameter it may indicate problems with power management and/or PnP.

It would be nice to see !analyze -v output for the other ones.

Krzysztof Uchronski

I’ve just looked at the call stack again and to tell the truth it doesn’t make any sense. Did you load the correct symbols for OS (.symfix/.reload/!analyze -v)? Again it might be a case when you have completely useless mini dump.

Krzysztof Uchronski

Yes, they’re minidumps - but this is from an user on another message board and I haven’t heard back from them.

The symbol path is fine (SRV*c:\symbols*http://msdl.microsoft.com/download/symbols), but when I run .symfix/.reload/!analyze -v I get symbol errors (happens on both dump files)

Do you still want to see the !analyze -v output on the STOP 0x50 and the 0x9F?
Parameter 1 of the STOP 0x9F is: 3 - A device object has been blocking an Irp for too long a time

Here’s the output:

Microsoft (R) Windows Debugger Version 6.11.0001.404 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.

Loading Dump File [C:\Windows\Minidump\0x333\013110-26488-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available

Symbol search path is: SRV*c:\symbols*http://msdl.microsoft.com/download/symbols
Executable search path is:
Windows 7 Kernel Version 7600 MP (4 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS Personal
Built by: 7600.16385.amd64fre.win7_rtm.090713-1255
Machine Name:
Kernel base = 0xfffff80002c55000 PsLoadedModuleList = 0xfffff80002e92e50
Debug session time: Sun Jan 31 19:16:24.663 2010 (GMT-5)
System Uptime: 0 days 19:28:47.177
Loading Kernel Symbols



Loading User Symbols
Loading unloaded module list

Unable to load image \SystemRoot\system32\DRIVERS\nvlddmkm.sys, Win32 error 0n2
*** WARNING: Unable to verify timestamp for nvlddmkm.sys
*** ERROR: Module load completed but symbols could not be loaded for nvlddmkm.sys
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************

Use !analyze -v to get detailed debugging information.

BugCheck 333, {1, 2, 3, 4}

Probably caused by : nvlddmkm.sys ( nvlddmkm+7df0c )

Followup: MachineOwner

0: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************

Unknown bugcheck code (333)
Unknown bugcheck description
Arguments:
Arg1: 0000000000000001
Arg2: 0000000000000002
Arg3: 0000000000000003
Arg4: 0000000000000004

Debugging Details:

CUSTOMER_CRASH_COUNT: 1

DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT

BUGCHECK_STR: 0x333

PROCESS_NAME: csrss.exe

CURRENT_IRQL: 0

LAST_CONTROL_TRANSFER: from fffff8800fe88f0c to fffff80002cc6f00

STACK_TEXT:
fffff88003acc1c8 fffff8800fe88f0c : 0000000000000333 0000000000000001 0000000000000002 0000000000000003 : nt!KeBugCheckEx
fffff88003acc1d0 0000000000000333 : 0000000000000001 0000000000000002 0000000000000003 0000000000000004 : nvlddmkm+0x7df0c
fffff88003acc1d8 0000000000000001 : 0000000000000002 0000000000000003 0000000000000004 fffff8800fe8250f : 0x333
fffff88003acc1e0 0000000000000002 : 0000000000000003 0000000000000004 fffff8800fe8250f 0000000000000028 : 0x1
fffff88003acc1e8 0000000000000003 : 0000000000000004 fffff8800fe8250f 0000000000000028 fffff8800fe2fb6c : 0x2
fffff88003acc1f0 0000000000000004 : fffff8800fe8250f 0000000000000028 fffff8800fe2fb6c 0000000000000100 : 0x3
fffff88003acc1f8 fffff8800fe8250f : 0000000000000028 fffff8800fe2fb6c 0000000000000100 0000000000000080 : 0x4
fffff88003acc200 0000000000000028 : fffff8800fe2fb6c 0000000000000100 0000000000000080 0000000000449747 : nvlddmkm+0x7750f
fffff88003acc208 fffff8800fe2fb6c : 0000000000000100 0000000000000080 0000000000449747 fffff80002df94d3 : 0x28
fffff88003acc210 0000000000000100 : 0000000000000080 0000000000449747 fffff80002df94d3 fffff88005bcc000 : nvlddmkm+0x24b6c
fffff88003acc218 0000000000000080 : 0000000000449747 fffff80002df94d3 fffff88005bcc000 fffff8800fe8c161 : 0x100
fffff88003acc220 0000000000449747 : fffff80002df94d3 fffff88005bcc000 fffff8800fe8c161 023402500250026c : 0x80
fffff88003acc228 fffff80002df94d3 : fffff88005bcc000 fffff8800fe8c161 023402500250026c fffff8803fffffff : 0x449747
fffff88003acc230 fffffa8003e65880 : ffffffffffffffff fffff8801054b680 0000000000000000 fffffa8003e65d40 : nt!ExAllocatePoolWithTag+0x103
fffff88003acc320 ffffffffffffffff : fffff8801054b680 0000000000000000 fffffa8003e65d40 0000000000000000 : 0xfffffa8003e65880 fffff88003acc328 fffff8801054b680 : 0000000000000000 fffffa8003e65d40 0000000000000000 00000000000001eb : 0xffffffffffffffff
fffff88003acc330 0000000000000000 : fffffa8003e65d40 0000000000000000 00000000000001eb 00000000000001e4 : nvlddmkm+0x740680

STACK_COMMAND: kb

FOLLOWUP_IP:
nvlddmkm+7df0c
fffff880`0fe88f0c ?? ???

SYMBOL_STACK_INDEX: 1

SYMBOL_NAME: nvlddmkm+7df0c

FOLLOWUP_NAME: MachineOwner

MODULE_NAME: nvlddmkm

IMAGE_NAME: nvlddmkm.sys

DEBUG_FLR_IMAGE_TIMESTAMP: 4b4c080b

FAILURE_BUCKET_ID: X64_0x333_nvlddmkm+7df0c

BUCKET_ID: X64_0x333_nvlddmkm+7df0c

Followup: MachineOwner

0: kd> .symfix
0: kd> .reload
Unable to load image \SystemRoot\system32\ntoskrnl.exe, Win32 error 0n2
*** WARNING: Unable to verify timestamp for ntoskrnl.exe
*** ERROR: Module load completed but symbols could not be loaded for ntoskrnl.exe
Loading Kernel Symbols



Loading User Symbols
Loading unloaded module list

0: kd> !analyze -v
Unable to load image \SystemRoot\system32\DRIVERS\nvlddmkm.sys, Win32 error 0n2
*** WARNING: Unable to verify timestamp for nvlddmkm.sys
*** ERROR: Module load completed but symbols could not be loaded for nvlddmkm.sys
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************

Unknown bugcheck code (333)
Unknown bugcheck description
Arguments:
Arg1: 0000000000000001
Arg2: 0000000000000002
Arg3: 0000000000000003
Arg4: 0000000000000004

Debugging Details:

Unable to load image \SystemRoot\system32\DRIVERS\mouclass.sys, Win32 error 0n2
*** WARNING: Unable to verify timestamp for mouclass.sys
*** ERROR: Module load completed but symbols could not be loaded for mouclass.sys
***** Kernel symbols are WRONG. Please fix symbols to do analysis.

*************************************************************************
*** ***
*** ***
*** Your debugger is not using the correct symbols ***
*** ***
*** In order for this command to work properly, your symbol path ***
*** must point to .pdb files that have full type information. ***
*** ***
*** Certain .pdb files (such as the public OS symbols) do not ***
*** contain the required information. Contact the group that ***
*** provided you with these symbols if you need this command to ***
*** work. ***
*** ***
*** Type referenced: nt!_KPRCB ***
*** ***
*************************************************************************
*************************************************************************
*** ***
*** ***
*** Your debugger is not using the correct symbols ***
*** ***
*** In order for this command to work properly, your symbol path ***
*** must point to .pdb files that have full type information. ***
*** ***
*** Certain .pdb files (such as the public OS symbols) do not ***
*** contain the required information. Contact the group that ***
*** provided you with these symbols if you need this command to ***
*** work. ***
*** ***
*** Type referenced: nt!KPRCB ***
*** ***
*************************************************************************
*************************************************************************
*** ***
*** ***
*** Your debugger is not using the correct symbols ***
*** ***
*** In order for this command to work properly, your symbol path ***
*** must point to .pdb files that have full type information. ***
*** ***
*** Certain .pdb files (such as the public OS symbols) do not ***
*** contain the required information. Contact the group that ***
*** provided you with these symbols if you need this command to ***
*** work. ***
*** ***
*** Type referenced: nt!_KPRCB ***
*** ***
*************************************************************************
*************************************************************************
*** ***
*** ***
*** Your debugger is not using the correct symbols ***
*** ***
*** In order for this command to work properly, your symbol path ***
*** must point to .pdb files that have full type information. ***
*** ***
*** Certain .pdb files (such as the public OS symbols) do not ***
*** contain the required information. Contact the group that ***
*** provided you with these symbols if you need this command to ***
*** work. ***
*** ***
*** Type referenced: nt!KPRCB ***
*** ***
*************************************************************************
*************************************************************************
*** ***
*** ***
*** Your debugger is not using the correct symbols ***
*** ***
*** In order for this command to work properly, your symbol path ***
*** must point to .pdb files that have full type information. ***
*** ***
*** Certain .pdb files (such as the public OS symbols) do not ***
*** contain the required information. Contact the group that ***
*** provided you with these symbols if you need this command to ***
*** work. ***
*** ***
*** Type referenced: nt!_KPRCB ***
*** ***
*************************************************************************
*************************************************************************
*** ***
*** ***
*** Your debugger is not using the correct symbols ***
*** ***
*** In order for this command to work properly, your symbol path ***
*** must point to .pdb files that have full type information. ***
*** ***
*** Certain .pdb files (such as the public OS symbols) do not ***
*** contain the required information. Contact the group that ***
*** provided you with these symbols if you need this command to ***
*** work. ***
*** ***
*** Type referenced: nt!_KPRCB ***
*** ***
*************************************************************************
*************************************************************************
*** ***
*** ***
*** Your debugger is not using the correct symbols ***
*** ***
*** In order for this command to work properly, your symbol path ***
*** must point to .pdb files that have full type information. ***
*** ***
*** Certain .pdb files (such as the public OS symbols) do not ***
*** contain the required information. Contact the group that ***
*** provided you with these symbols if you need this command to ***
*** work. ***
*** ***
*** Type referenced: nt!_KPRCB ***
*** ***
*************************************************************************
*************************************************************************
*** ***
*** ***
*** Your debugger is not using the correct symbols ***
*** ***
*** In order for this command to work properly, your symbol path ***
*** must point to .pdb files that have full type information. ***
*** ***
*** Certain .pdb files (such as the public OS symbols) do not ***
*** contain the required information. Contact the group that ***
*** provided you with these symbols if you need this command to ***
*** work. ***
*** ***
*** Type referenced: nt!_KPRCB ***
*** ***
*************************************************************************

ADDITIONAL_DEBUG_TEXT:
Use ‘!findthebuild’ command to search for the target build information.
If the build information is available, run ‘!findthebuild -s ; .reload’ to set symbol path and load symbols.

FAULTING_MODULE: fffff80002c55000 nt

DEBUG_FLR_IMAGE_TIMESTAMP: 4b4c080b

CUSTOMER_CRASH_COUNT: 1

DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT

BUGCHECK_STR: 0x333

CURRENT_IRQL: 0

LAST_CONTROL_TRANSFER: from fffff8800fe88f0c to fffff80002cc6f00

STACK_TEXT:
fffff88003acc1c8 fffff8800fe88f0c : 0000000000000333 0000000000000001 0000000000000002 0000000000000003 : nt+0x71f00
fffff88003acc1d0 0000000000000333 : 0000000000000001 0000000000000002 0000000000000003 0000000000000004 : nvlddmkm+0x7df0c
fffff88003acc1d8 0000000000000001 : 0000000000000002 0000000000000003 0000000000000004 fffff8800fe8250f : 0x333
fffff88003acc1e0 0000000000000002 : 0000000000000003 0000000000000004 fffff8800fe8250f 0000000000000028 : 0x1
fffff88003acc1e8 0000000000000003 : 0000000000000004 fffff8800fe8250f 0000000000000028 fffff8800fe2fb6c : 0x2
fffff88003acc1f0 0000000000000004 : fffff8800fe8250f 0000000000000028 fffff8800fe2fb6c 0000000000000100 : 0x3
fffff88003acc1f8 fffff8800fe8250f : 0000000000000028 fffff8800fe2fb6c 0000000000000100 0000000000000080 : 0x4
fffff88003acc200 0000000000000028 : fffff8800fe2fb6c 0000000000000100 0000000000000080 0000000000449747 : nvlddmkm+0x7750f
fffff88003acc208 fffff8800fe2fb6c : 0000000000000100 0000000000000080 0000000000449747 fffff80002df94d3 : 0x28
fffff88003acc210 0000000000000100 : 0000000000000080 0000000000449747 fffff80002df94d3 fffff88005bcc000 : nvlddmkm+0x24b6c
fffff88003acc218 0000000000000080 : 0000000000449747 fffff80002df94d3 fffff88005bcc000 fffff8800fe8c161 : 0x100
fffff88003acc220 0000000000449747 : fffff80002df94d3 fffff88005bcc000 fffff8800fe8c161 023402500250026c : 0x80
fffff88003acc228 fffff80002df94d3 : fffff88005bcc000 fffff8800fe8c161 023402500250026c fffff8803fffffff : 0x449747
fffff88003acc230 fffff88005bcc000 : fffff8800fe8c161 023402500250026c fffff8803fffffff 0000000000000064 : nt+0x1a44d3
fffff88003acc238 fffff8800fe8c161 : 023402500250026c fffff8803fffffff 0000000000000064 0000000095000000 : 0xfffff88005bcc000 fffff88003acc240 023402500250026c : fffff8803fffffff 0000000000000064 0000000095000000 fffffa8005571000 : nvlddmkm+0x81161 fffff88003acc248 fffff8803fffffff : 0000000000000064 0000000095000000 fffffa8005571000 fffff88002c02688 : 0x23402500250026c
fffff88003acc250 0000000000000064 : 0000000095000000 fffffa8005571000 fffff88002c02688 0000000000000000 : 0xfffff8803fffffff fffff88003acc258 0000000095000000 : fffffa8005571000 fffff88002c02688 0000000000000000 0000000000000000 : 0x64 fffff88003acc260 fffffa8005571000 : fffff88002c02688 0000000000000000 0000000000000000 0000000000000000 : 0x95000000 fffff88003acc268 fffff88002c02688 : 0000000000000000 0000000000000000 0000000000000000 0000000000000001 : 0xfffffa8005571000
fffff88003acc270 0000000000000000 : 0000000000000000 0000000000000000 0000000000000001 00000000000001e4 : mouclass+0x2688

STACK_COMMAND: kb

FOLLOWUP_IP:
nvlddmkm+7df0c
fffff880`0fe88f0c ?? ???

SYMBOL_STACK_INDEX: 1

SYMBOL_NAME: nvlddmkm+7df0c

FOLLOWUP_NAME: MachineOwner

MODULE_NAME: nvlddmkm

IMAGE_NAME: nvlddmkm.sys

BUCKET_ID: WRONG_SYMBOLS

Followup: MachineOwner

Try to fix symbol errors by setting image file path “.exepath srv*” and then run the analysis again. If it doesn’t work then you should definitely get kernel memory dumps.

Krzysztof Uchronski

Thanks for your help. The errors in the minidump continue, so I’ll see if the original poster would like to help track this down.

  • John (aka usasma)

I have another poster with the same error here: http://www.sevenforums.com/crashes-debugging/63389-used-vista-glary-utilities-defrag-7-reg-now-bsod.html#post567454

He’s consented to provide a complete memory dump and has uploaded it here (38.1 mB): http://markreicheldesigns.com/MEMORY.zip

Please excuse my eagerness. In my haste to post the link to the complete memory dump, I neglected to verify if it was a STOP 0x333. When I did open the dump, it was found to be a STOP 0xF4. I will contact the user and ask them to continue monitoring for a STOP 0x333.

I’m a bit fried, so I’ll post this last bit and quit for the day.
The above link is incorrect - both for the post and for the memory dump file.

This is the correct link for the other STOP 0x333 error: http://www.sevenforums.com/crashes-debugging/62281-win-7-bugcheck-333-a.html

The user has not posted back with confirmation or with additional memory dumps.

Again, my sincere apologies for the errors.

  • John