Microsoft (R) Windows Debugger Version 6.12.0002.633 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [F:\a\Minidump\D M P\DMP\031211-42401-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
Symbol search path is: SRV*c:\websymbols*http://msdl.microsoft.com/download/symbols
Executable search path is:
Windows 7 Kernel Version 7601 (Service Pack 1) MP (4 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS
Built by: 7601.17514.amd64fre.win7sp1_rtm.101119-1850
Machine Name:
Kernel base = 0xfffff800`02c17000 PsLoadedModuleList = 0xfffff800`02e5ce90
Debug session time: Sat Mar 12 12:53:29.986 2011 (UTC - 5:00)
System Uptime: 0 days 0:00:39.968
Loading Kernel Symbols
...............................................................
................................................................
.....
Loading User Symbols
Loading unloaded module list
....
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
Use !analyze -v to get detailed debugging information.
BugCheck 50, {ffffffffffffffef, 0, fffff80002dc2dd3, 0}
Unable to load image \SystemRoot\system32\DRIVERS\atikmpag.sys, Win32 error 0n2
*** WARNING: Unable to verify timestamp for atikmpag.sys
*** ERROR: Module load completed but symbols could not be loaded for atikmpag.sys
Could not read faulting driver name
Probably caused by : atikmpag.sys ( atikmpag+10aec )
Followup: MachineOwner
---------
0: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
PAGE_FAULT_IN_NONPAGED_AREA (50)
Invalid system memory was referenced. This cannot be protected by try-except,
it must be protected by a Probe. Typically the address is just plain bad or it
is pointing at freed memory.
Arguments:
Arg1: ffffffffffffffef, memory referenced.
Arg2: 0000000000000000, value 0 = read operation, 1 = write operation.
Arg3: fffff80002dc2dd3, If non-zero, the instruction address which referenced the bad memory
address.
Arg4: 0000000000000000, (reserved)
Debugging Details:
------------------
Could not read faulting driver name
READ_ADDRESS: GetPointerFromAddress: unable to read from fffff80002ec80e8
ffffffffffffffef
FAULTING_IP:
nt!ExFreePoolWithTag+43
fffff800`02dc2dd3 418b45f0 mov eax,dword ptr [r13-10h]
MM_INTERNAL_CODE: 0
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT
BUGCHECK_STR: 0x50
PROCESS_NAME: System
CURRENT_IRQL: 0
TRAP_FRAME: fffff880031c43a0 -- (.trap 0xfffff880031c43a0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000000 rbx=0000000000000000 rcx=ffffffffffffffff
rdx=000000005958504b rsi=0000000000000000 rdi=0000000000000000
rip=fffff80002dc2dd3 rsp=fffff880031c4530 rbp=fffffa80048f19e0
r8=0000000000006680 r9=00000000000000c0 r10=fffff80002c17000
r11=0000000000000290 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei pl nz na po nc
nt!ExFreePoolWithTag+0x43:
fffff800`02dc2dd3 418b45f0 mov eax,dword ptr [r13-10h] ds:ffffffff`fffffff0=????????
Resetting default scope
LAST_CONTROL_TRANSFER: from fffff80002c432ac to fffff80002c97640
STACK_TEXT:
fffff880`031c4238 fffff800`02c432ac : 00000000`00000050 ffffffff`ffffffef 00000000`00000000 fffff880`031c43a0 : nt!KeBugCheckEx
fffff880`031c4240 fffff800`02c9576e : 00000000`00000000 ffffffff`ffffffef fffffa80`03960100 fffffa80`0590a840 : nt! ?? ::FNODOBFM::`string'+0x4621f
fffff880`031c43a0 fffff800`02dc2dd3 : fffffa80`058e9ec0 00000000`000000c0 00000000`30305800 00000000`000007ff : nt!KiPageFault+0x16e
fffff880`031c4530 fffff880`042d5aec : fffffa80`0555fd40 fffffa80`048f19e0 00000000`00000000 fffffa80`048f19e0 : nt!ExFreePoolWithTag+0x43
fffff880`031c45e0 fffffa80`0555fd40 : fffffa80`048f19e0 00000000`00000000 fffffa80`048f19e0 fffffa80`0590a840 : atikmpag+0x10aec
fffff880`031c45e8 fffffa80`048f19e0 : 00000000`00000000 fffffa80`048f19e0 fffffa80`0590a840 fffff880`042ce0f2 : 0xfffffa80`0555fd40
fffff880`031c45f0 00000000`00000000 : fffffa80`048f19e0 fffffa80`0590a840 fffff880`042ce0f2 00000000`00000001 : 0xfffffa80`048f19e0
STACK_COMMAND: kb
FOLLOWUP_IP:
atikmpag+10aec
fffff880`042d5aec ?? ???
SYMBOL_STACK_INDEX: 4
SYMBOL_NAME: atikmpag+10aec
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: atikmpag
IMAGE_NAME: atikmpag.sys
DEBUG_FLR_IMAGE_TIMESTAMP: 4d409c8d
FAILURE_BUCKET_ID: X64_0x50_atikmpag+10aec
BUCKET_ID: X64_0x50_atikmpag+10aec
Followup: MachineOwner
---------