0: kd> !analyze -v*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
SYSTEM_THREAD_EXCEPTION_NOT_HANDLED_M (1000007e)
This is a very common bugcheck. Usually the exception address pinpoints
the driver/function that caused the problem. Always note this address
as well as the link date of the driver/image that contains this address.
Some common problems are exception code 0x80000003. This means a hard
coded breakpoint or assertion was hit, but this system was booted
/NODEBUG. This is not supposed to happen as developers should never have
hardcoded breakpoints in retail code, but ...
If this happens, make sure a debugger gets connected, and the
system is booted /DEBUG. This will let us see why this breakpoint is
happening.
Arguments:
Arg1: ffffffffc0000005, The exception code that was not handled
Arg2: fffff800b539bdbb, The address that the exception occurred at
Arg3: ffffd00162906128, Exception Record Address
Arg4: ffffd00162905930, Context Record Address
Debugging Details:
------------------
EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - The instruction at 0x%08lx referenced memory at 0x%08lx. The memory could not be %s.
FAULTING_IP:
atikmdag+c7dbb
fffff800`b539bdbb 488b83a8060000 mov rax,qword ptr [rbx+6A8h]
EXCEPTION_RECORD: ffffd00162906128 -- (.exr 0xffffd00162906128)
ExceptionAddress: fffff800b539bdbb (atikmdag+0x00000000000c7dbb)
ExceptionCode: c0000005 (Access violation)
ExceptionFlags: 00000000
NumberParameters: 2
Parameter[0]: 0000000000000000
Parameter[1]: 00000000000006a8
Attempt to read from address 00000000000006a8
CONTEXT: ffffd00162905930 -- (.cxr 0xffffd00162905930;r)
rax=0000000000000000 rbx=0000000000000000 rcx=0000000000000000
rdx=0000000000000000 rsi=00000000000f0000 rdi=0000000000000002
rip=fffff800b539bdbb rsp=ffffd00162906360 rbp=ffffe0010db17060
r8=0000000000000002 r9=000000f410da8000 r10=0000000000000000
r11=fffff800b421d587 r12=ffffe0010d996180 r13=ffffe0010cf30dc0
r14=ffffe00112001010 r15=fffff800b52d4000
iopl=0 nv up ei pl zr na po nc
cs=0010 ss=0018 ds=002b es=002b fs=0053 gs=002b efl=00010246
atikmdag+0xc7dbb:
fffff800`b539bdbb 488b83a8060000 mov rax,qword ptr [rbx+6A8h] ds:002b:00000000`000006a8=????????????????
Last set context:
rax=[COLOR=#ff0000]0000000000000000[/COLOR] rbx=[COLOR=#0000ff]0000000000000000[/COLOR] rcx=0000000000000000
rdx=0000000000000000 rsi=00000000000f0000 rdi=0000000000000002
rip=fffff800b539bdbb rsp=ffffd00162906360 rbp=ffffe0010db17060
r8=0000000000000002 r9=000000f410da8000 r10=0000000000000000
r11=fffff800b421d587 r12=ffffe0010d996180 r13=ffffe0010cf30dc0
r14=ffffe00112001010 r15=fffff800b52d4000
iopl=0 nv up ei pl zr na po nc
cs=0010 ss=0018 ds=002b es=002b fs=0053 gs=002b efl=00010246
atikmdag+0xc7dbb:
fffff800`b539bdbb 488b83a8060000 mov rax,qword ptr [rbx+6A8h] ds:002b:00000000`000006a8=????????????????
Resetting default scope
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: WIN8_DRIVER_FAULT
PROCESS_NAME: System
CURRENT_IRQL: 0
ERROR_CODE: (NTSTATUS) 0xc0000005 - The instruction at 0x%08lx referenced memory at 0x%08lx. The memory could not be %s.
EXCEPTION_PARAMETER1: 0000000000000000
EXCEPTION_PARAMETER2: 00000000000006a8
READ_ADDRESS: GetPointerFromAddress: unable to read from fffff8003a355138
unable to get nt!MmNonPagedPoolStart
unable to get nt!MmSizeOfNonPagedPoolInBytes
00000000000006a8
FOLLOWUP_IP:
atikmdag+c7dbb
fffff800`b539bdbb 488b83a8060000 [B]mov[/B] [COLOR=#ff0000]rax,qword ptr [rbx+6A8h][/COLOR]
BUGCHECK_STR: AV
ANALYSIS_VERSION: 6.3.9600.17237 (debuggers(dbg).140716-0327) amd64fre
LAST_CONTROL_TRANSFER: from 00000000001e6ad5 to fffff800b539bdbb
STACK_TEXT:
ffffd001`62906360 00000000`001e6ad5 : 00000000`00000000 00000000`00000000 00000000`000000aa ffffe001`12001010 : atikmdag+0xc7dbb
ffffd001`62906368 00000000`00000000 : 00000000`00000000 00000000`000000aa ffffe001`12001010 fffff800`b53fcf6f : 0x1e6ad5
SYMBOL_STACK_INDEX: 0
SYMBOL_NAME: atikmdag+c7dbb
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: atikmdag
IMAGE_NAME: atikmdag.sys
DEBUG_FLR_IMAGE_TIMESTAMP: 53508a3c
STACK_COMMAND: .cxr 0xffffd00162905930 ; kb
FAILURE_BUCKET_ID: AV_atikmdag+c7dbb
BUCKET_ID: AV_atikmdag+c7dbb
ANALYSIS_SOURCE: KM
FAILURE_ID_HASH_STRING: km:av_atikmdag+c7dbb
FAILURE_ID_HASH: {0471d6b8-06e1-47c6-22ba-995dd0010efa}
Followup: MachineOwner
---------