*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
Use !analyze -v to get detailed debugging information.
BugCheck 3B, {c0000005, fffff801e8c3e370, ffffd000c89eefe0, 0}
*** WARNING: Unable to verify timestamp for atikmdag.sys
*** ERROR: Module load completed but symbols could not be loaded for atikmdag.sys
Probably caused by : atikmdag.sys ( atikmdag+2a370 )
Followup: MachineOwner
---------
4: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
SYSTEM_SERVICE_EXCEPTION (3b)
An exception happened while executing a system service routine.
Arguments:
Arg1: 00000000c0000005, Exception code that caused the bugcheck
Arg2: fffff801e8c3e370, Address of the instruction which caused the bugcheck
Arg3: ffffd000c89eefe0, Address of the context record for the exception that caused the bugcheck
Arg4: 0000000000000000, zero.
Debugging Details:
------------------
EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - The instruction at 0x%08lx referenced memory at 0x%08lx. The memory could not be %s.
FAULTING_IP:
atikmdag+2a370
fffff801`e8c3e370 488b4130 mov rax,qword ptr [rcx+30h]
CONTEXT: ffffd000c89eefe0 -- (.cxr 0xffffd000c89eefe0;r)
rax=ffe2ffe7ffe2ffe7 rbx=000000f418585000 rcx=ffe2ffe7ffe2ffe7
rdx=ffffe0004c080e60 rsi=0000000000000000 rdi=ffe2ffe7ffe2ffe7
rip=fffff801e8c3e370 rsp=ffffd000c89efa18 rbp=ffffc0019a620160
r8=0000000000000106 r9=ffffc001a4891000 r10=ffffe0004d909240
r11=ffffd000c89efa58 r12=0000000000000004 r13=0000000000000106
r14=ffffc001a4892890 r15=ffffc0019a620158
iopl=0 nv up ei ng nz na po nc
cs=0010 ss=0018 ds=002b es=002b fs=0053 gs=002b efl=00010286
atikmdag+0x2a370:
fffff801`e8c3e370 488b4130 mov rax,qword ptr [rcx+30h] ds:002b:ffe2ffe7`ffe30017=????????????????
Last set context:
rax=ffe2ffe7ffe2ffe7 rbx=000000f418585000 rcx=ffe2ffe7ffe2ffe7
rdx=ffffe0004c080e60 rsi=0000000000000000 rdi=ffe2ffe7ffe2ffe7
rip=fffff801e8c3e370 rsp=ffffd000c89efa18 rbp=ffffc0019a620160
r8=0000000000000106 r9=ffffc001a4891000 r10=ffffe0004d909240
r11=ffffd000c89efa58 r12=0000000000000004 r13=0000000000000106
r14=ffffc001a4892890 r15=ffffc0019a620158
iopl=0 nv up ei ng nz na po nc
cs=0010 ss=0018 ds=002b es=002b fs=0053 gs=002b efl=00010286
atikmdag+0x2a370:
fffff801`e8c3e370 488b4130 mov rax,qword ptr [rcx+30h] ds:002b:ffe2ffe7`ffe30017=????????????????
Resetting default scope
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: WIN8_DRIVER_FAULT
BUGCHECK_STR: 0x3B
PROCESS_NAME: left4dead2.exe
CURRENT_IRQL: 1
ANALYSIS_VERSION: 6.3.9600.17237 (debuggers(dbg).140716-0327) amd64fre
LAST_CONTROL_TRANSFER: from fffff801e8cd1e1d to fffff801e8c3e370
STACK_TEXT:
ffffd000`c89efa18 fffff801`e8cd1e1d : ffffe000`50330c80 00000000`00001400 00000000`00000128 fffff801`e8d2ca09 : atikmdag+0x2a370
ffffd000`c89efa20 ffffe000`50330c80 : 00000000`00001400 00000000`00000128 fffff801`e8d2ca09 fffff801`ead90000 : atikmdag+0xbde1d
ffffd000`c89efa28 00000000`00001400 : 00000000`00000128 fffff801`e8d2ca09 fffff801`ead90000 ffffe000`4fe1e5c0 : 0xffffe000`50330c80
ffffd000`c89efa30 00000000`00000128 : fffff801`e8d2ca09 fffff801`ead90000 ffffe000`4fe1e5c0 00000000`00000000 : 0x1400
ffffd000`c89efa38 fffff801`e8d2ca09 : fffff801`ead90000 ffffe000`4fe1e5c0 00000000`00000000 00000000`00000000 : 0x128
ffffd000`c89efa40 fffff801`ead90000 : ffffe000`4fe1e5c0 00000000`00000000 00000000`00000000 ffffc001`a4891000 : atikmdag+0x118a09
ffffd000`c89efa48 ffffe000`4fe1e5c0 : 00000000`00000000 00000000`00000000 ffffc001`a4891000 ffffe000`502f0040 : 0xfffff801`ead90000
ffffd000`c89efa50 00000000`00000000 : 00000000`00000000 ffffc001`a4891000 ffffe000`502f0040 ffffe000`502f0270 : 0xffffe000`4fe1e5c0
FOLLOWUP_IP:
atikmdag+2a370
fffff801`e8c3e370 488b4130 mov rax,qword ptr [rcx+30h]
SYMBOL_STACK_INDEX: 0
SYMBOL_NAME: atikmdag+2a370
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: atikmdag
IMAGE_NAME: atikmdag.sys
DEBUG_FLR_IMAGE_TIMESTAMP: 5357827f
STACK_COMMAND: .cxr 0xffffd000c89eefe0 ; kb
FAILURE_BUCKET_ID: 0x3B_atikmdag+2a370
BUCKET_ID: 0x3B_atikmdag+2a370
ANALYSIS_SOURCE: KM
FAILURE_ID_HASH_STRING: km:0x3b_atikmdag+2a370
FAILURE_ID_HASH: {9442bf0c-eca2-c707-9647-f9ec87fad87d}
Followup: MachineOwner
---------