...
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
Use !analyze -v to get detailed debugging information.
BugCheck A, {fffffa7fffffffe0, 2, 1, fffff8000d1b119c}
Unable to load image igdkmd64.sys, Win32 error 0n2
*** WARNING: Unable to verify timestamp for igdkmd64.sys
*** ERROR: Module load completed but symbols could not be loaded for igdkmd64.sys
Probably caused by : igdkmd64.sys ( igdkmd64+8d84f )
Followup: MachineOwner
---------
1: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
IRQL_NOT_LESS_OR_EQUAL (a)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high. This is usually
caused by drivers using improper addresses.
If a kernel debugger is available get the stack backtrace.
Arguments:
Arg1: fffffa7fffffffe0, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000001, bitfield :
bit 0 : value 0 = read operation, 1 = write operation
bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
Arg4: fffff8000d1b119c, address which referenced memory
Debugging Details:
------------------
WRITE_ADDRESS: GetPointerFromAddress: unable to read from fffff8000d2f40e0
fffffa7fffffffe0
CURRENT_IRQL: 2
FAULTING_IP:
nt!MiAllocateMostlyContiguous+85c
fffff800`0d1b119c f00fba6b1000 lock bts dword ptr [rbx+10h],0
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT
BUGCHECK_STR: 0xA
PROCESS_NAME: csrss.exe
TRAP_FRAME: fffff88005b3b060 -- (.trap 0xfffff88005b3b060)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000000 rbx=0000000000000000 rcx=0000000000000000
rdx=ffffffffffd0d000 rsi=0000000000000000 rdi=0000000000000000
rip=fffff8000d1b119c rsp=fffff88005b3b1f0 rbp=fffff88005b3b240
r8=0000000000000000 r9=0000000000000003 r10=fffff8000d249440
r11=0000000000000000 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei ng nz na po nc
nt!MiAllocateMostlyContiguous+0x85c:
fffff800`0d1b119c f00fba6b1000 lock bts dword ptr [rbx+10h],0 ds:2b60:00000000`00000010=????????
Resetting default scope
LAST_CONTROL_TRANSFER: from fffff8000d0bbb29 to fffff8000d0bc5c0
STACK_TEXT:
fffff880`05b3af18 fffff800`0d0bbb29 : 00000000`0000000a fffffa7f`ffffffe0 00000000`00000002 00000000`00000001 : nt!KeBugCheckEx
fffff880`05b3af20 fffff800`0d0ba7a0 : fffffa80`0b2c2b00 fffffa7f`ffffffd0 00000000`00000000 fffff880`05b3b090 : nt!KiBugCheckDispatch+0x69
fffff880`05b3b060 fffff800`0d1b119c : fffffa80`06cacb30 fffffa80`00000000 fffffa80`0b2c2b60 fffff800`0d3cf294 : nt!KiPageFault+0x260
fffff880`05b3b1f0 fffff800`0d1def5e : fffffa80`0b6fb7d0 00000000`00000100 00000000`00000000 00000000`000000ff : nt!MiAllocateMostlyContiguous+0x85c
fffff880`05b3b340 fffff800`0d1df5e9 : 00000000`00000000 fffffa80`0b6fa000 fffffa80`0a24c760 fffff880`0486ee85 : nt!MiAllocatePagesForMdl+0x62e
fffff880`05b3b440 fffff880`048bb84f : 00000000`00000000 fffffa80`0a24c764 00000000`00000001 00000000`00001598 : nt!MmAllocatePagesForMdlEx+0x89
fffff880`05b3b480 00000000`00000000 : fffffa80`0a24c764 00000000`00000001 00000000`00001598 00000000`00000000 : igdkmd64+0x8d84f
STACK_COMMAND: kb
FOLLOWUP_IP:
igdkmd64+8d84f
fffff880`048bb84f ?? ???
SYMBOL_STACK_INDEX: 6
SYMBOL_NAME: igdkmd64+8d84f
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: igdkmd64
IMAGE_NAME: igdkmd64.sys
DEBUG_FLR_IMAGE_TIMESTAMP: 4e5e9129
FAILURE_BUCKET_ID: X64_0xA_igdkmd64+8d84f
BUCKET_ID: X64_0xA_igdkmd64+8d84f
Followup: MachineOwner