*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
Use !analyze -v to get detailed debugging information.
BugCheck 50, {fffff8c004d530c7, 1, fffff88004d530e4, 5}
Unable to load image \SystemRoot\system32\DRIVERS\atikmdag.sys, Win32 error 0n2
*** WARNING: Unable to verify timestamp for atikmdag.sys
*** ERROR: Module load completed but symbols could not be loaded for atikmdag.sys
Could not read faulting driver name
Probably caused by : atikmdag.sys ( atikmdag+46c0e4 )
Followup: MachineOwner
---------
3: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
PAGE_FAULT_IN_NONPAGED_AREA (50)
Invalid system memory was referenced. This cannot be protected by try-except,
it must be protected by a Probe. Typically the address is just plain bad or it
is pointing at freed memory.
Arguments:
Arg1: fffff8c004d530c7, memory referenced.
Arg2: 0000000000000001, value 0 = read operation, 1 = write operation.
Arg3: fffff88004d530e4, If non-zero, the instruction address which referenced the bad memory
address.
Arg4: 0000000000000005, (reserved)
Debugging Details:
------------------
Could not read faulting driver name
WRITE_ADDRESS: GetPointerFromAddress: unable to read from fffff800030fe100
fffff8c004d530c7
FAULTING_IP:
atikmdag+46c0e4
fffff880`04d530e4 41c7000f65c190 mov dword ptr [r8],90C1650Fh
MM_INTERNAL_CODE: 5
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT
BUGCHECK_STR: 0x50
PROCESS_NAME: System
CURRENT_IRQL: 0
TRAP_FRAME: fffff88005be4a90 -- (.trap 0xfffff88005be4a90)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=000000007bbbb4ed rbx=0000000000000000 rcx=0000000000000000
rdx=0000000000000153 rsi=0000000000000000 rdi=0000000000000000
rip=fffff88004d530e4 rsp=fffff88005be4c28 rbp=0000000000000400
r8=fffff8c004d530c7 r9=fffff88005be4c70 r10=0000002c7bbbb39a
r11=000000000000016f r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up di pl nz na po nc
atikmdag+0x46c0e4:
fffff880`04d530e4 41c7000f65c190 mov dword ptr [r8],90C1650Fh ds:4ca8:fffff8c0`04d530c7=????????
Resetting default scope
LAST_CONTROL_TRANSFER: from fffff80002e793cf to fffff80002eced00
STACK_TEXT:
fffff880`05be4928 fffff800`02e793cf : 00000000`00000050 fffff8c0`04d530c7 00000000`00000001 fffff880`05be4a90 : nt!KeBugCheckEx
fffff880`05be4930 fffff800`02ecce2e : 00000000`00000001 fffff8c0`04d530c7 78c98bbb`f889f100 00000000`00000004 : nt! ?? ::FNODOBFM::`string'+0x44891
fffff880`05be4a90 fffff880`04d530e4 : fffff880`04bec5c0 00000000`00000004 cccccccc`00000000 00000000`00000000 : nt!KiPageFault+0x16e
fffff880`05be4c28 fffff880`04bec5c0 : 00000000`00000004 cccccccc`00000000 00000000`00000000 00000000`00000000 : atikmdag+0x46c0e4
fffff880`05be4c30 00000000`00000004 : cccccccc`00000000 00000000`00000000 00000000`00000000 fffff880`02f63180 : atikmdag+0x3055c0
fffff880`05be4c38 cccccccc`00000000 : 00000000`00000000 00000000`00000000 fffff880`02f63180 00000000`001ec6dd : 0x4
fffff880`05be4c40 00000000`00000000 : 00000000`00000000 fffff880`02f63180 00000000`001ec6dd 0000000e`00000198 : 0xcccccccc`00000000
STACK_COMMAND: kb
FOLLOWUP_IP:
atikmdag+46c0e4
fffff880`04d530e4 41c7000f65c190 mov dword ptr [r8],90C1650Fh
SYMBOL_STACK_INDEX: 3
SYMBOL_NAME: atikmdag+46c0e4
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: atikmdag
IMAGE_NAME: atikmdag.sys
DEBUG_FLR_IMAGE_TIMESTAMP: 4d40a4bc
FAILURE_BUCKET_ID: X64_0x50_atikmdag+46c0e4
BUCKET_ID: X64_0x50_atikmdag+46c0e4
Followup: MachineOwner
---------