Advertisement
Guest User

Untitled

a guest
Nov 18th, 2016
56
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
text 8.46 KB | None | 0 0
  1.  
  2. Microsoft (R) Windows Debugger Version 10.0.14321.1024 X86
  3. Copyright (c) Microsoft Corporation. All rights reserved.
  4.  
  5.  
  6. Loading Dump File [C:\Windows\MEMORY.DMP]
  7. Kernel Bitmap Dump File: Kernel address space is available, User address space may not be available.
  8.  
  9. Symbol search path is: srv*
  10. Executable search path is:
  11. Windows 8.1 Kernel Version 9600 MP (8 procs) Free x64
  12. Product: WinNt, suite: TerminalServer SingleUserTS
  13. Built by: 9600.18505.amd64fre.winblue_ltsb.160930-0600
  14. Machine Name:
  15. Kernel base = 0xfffff800`db00a000 PsLoadedModuleList = 0xfffff800`db2dd630
  16. Debug session time: Fri Nov 18 08:01:04.824 2016 (UTC - 5:00)
  17. System Uptime: 2 days 17:30:18.465
  18. Loading Kernel Symbols
  19. ...............................................................
  20. ................................................................
  21. ..........................................
  22. Loading User Symbols
  23.  
  24. Loading unloaded module list
  25. ....................
  26. *******************************************************************************
  27. * *
  28. * Bugcheck Analysis *
  29. * *
  30. *******************************************************************************
  31.  
  32. Use !analyze -v to get detailed debugging information.
  33.  
  34. BugCheck D1, {18, 2, 1, fffff8007864475a}
  35.  
  36. *** ERROR: Symbol file could not be found. Defaulted to export symbols for dxgkrnl.sys -
  37. *** ERROR: Module load completed but symbols could not be loaded for atikmdag.sys
  38. *** ERROR: Module load completed but symbols could not be loaded for atikmpag.sys
  39. Probably caused by : dxgmms1.sys ( dxgmms1!VidSchiProcessDpcVSyncCookie+37a )
  40.  
  41. Followup: MachineOwner
  42. ---------
  43.  
  44. 0: kd> !analyze -v
  45. *******************************************************************************
  46. * *
  47. * Bugcheck Analysis *
  48. * *
  49. *******************************************************************************
  50.  
  51. DRIVER_IRQL_NOT_LESS_OR_EQUAL (d1)
  52. An attempt was made to access a pageable (or completely invalid) address at an
  53. interrupt request level (IRQL) that is too high. This is usually
  54. caused by drivers using improper addresses.
  55. If kernel debugger is available get stack backtrace.
  56. Arguments:
  57. Arg1: 0000000000000018, memory referenced
  58. Arg2: 0000000000000002, IRQL
  59. Arg3: 0000000000000001, value 0 = read operation, 1 = write operation
  60. Arg4: fffff8007864475a, address which referenced memory
  61.  
  62. Debugging Details:
  63. ------------------
  64.  
  65.  
  66. DUMP_CLASS: 1
  67.  
  68. DUMP_QUALIFIER: 401
  69.  
  70. BUILD_VERSION_STRING: 9600.18505.amd64fre.winblue_ltsb.160930-0600
  71.  
  72. SYSTEM_MANUFACTURER: ASUS
  73.  
  74. SYSTEM_PRODUCT_NAME: All Series
  75.  
  76. SYSTEM_SKU: All
  77.  
  78. SYSTEM_VERSION: System Version
  79.  
  80. BIOS_VENDOR: American Megatrends Inc.
  81.  
  82. BIOS_VERSION: 1207
  83.  
  84. BIOS_DATE: 07/01/2013
  85.  
  86. BASEBOARD_MANUFACTURER: ASUSTeK COMPUTER INC.
  87.  
  88. BASEBOARD_PRODUCT: Z87-A
  89.  
  90. BASEBOARD_VERSION: Rev 1.xx
  91.  
  92. DUMP_TYPE: 1
  93.  
  94. BUGCHECK_P1: 18
  95.  
  96. BUGCHECK_P2: 2
  97.  
  98. BUGCHECK_P3: 1
  99.  
  100. BUGCHECK_P4: fffff8007864475a
  101.  
  102. WRITE_ADDRESS: 0000000000000018
  103.  
  104. CURRENT_IRQL: 2
  105.  
  106. FAULTING_IP:
  107. dxgmms1!VidSchiProcessDpcVSyncCookie+37a
  108. fffff800`7864475a f049ff4218 lock inc qword ptr [r10+18h]
  109.  
  110. CPU_COUNT: 8
  111.  
  112. CPU_MHZ: db2
  113.  
  114. CPU_VENDOR: GenuineIntel
  115.  
  116. CPU_FAMILY: 6
  117.  
  118. CPU_MODEL: 3c
  119.  
  120. CPU_STEPPING: 3
  121.  
  122. CPU_MICROCODE: 6,3c,3,0 (F,M,S,R) SIG: 1C'00000000 (cache) 1C'00000000 (init)
  123.  
  124. DEFAULT_BUCKET_ID: WIN8_DRIVER_FAULT
  125.  
  126. BUGCHECK_STR: AV
  127.  
  128. PROCESS_NAME: System
  129.  
  130. ANALYSIS_SESSION_HOST: CORE-SERVICES
  131.  
  132. ANALYSIS_SESSION_TIME: 11-18-2016 13:03:45.0572
  133.  
  134. ANALYSIS_VERSION: 10.0.14321.1024 x86fre
  135.  
  136. TRAP_FRAME: fffff800dcbc2270 -- (.trap 0xfffff800dcbc2270)
  137. NOTE: The trap frame does not contain all registers.
  138. Some register values may be zeroed or incorrect.
  139. rax=00000000fffffffe rbx=0000000000000000 rcx=0000000000000000
  140. rdx=0000000000000001 rsi=0000000000000000 rdi=0000000000000000
  141. rip=fffff8007864475a rsp=fffff800dcbc2400 rbp=fffff800dcbc2480
  142. r8=ffffe001f9ed2b00 r9=ffffe001f33ba110 r10=0000000000000000
  143. r11=0000000000000000 r12=0000000000000000 r13=0000000000000000
  144. r14=0000000000000000 r15=0000000000000000
  145. iopl=0 nv up ei pl zr na po nc
  146. dxgmms1!VidSchiProcessDpcVSyncCookie+0x37a:
  147. fffff800`7864475a f049ff4218 lock inc qword ptr [r10+18h] ds:00000000`00000018=????????????????
  148. Resetting default scope
  149.  
  150. LAST_CONTROL_TRANSFER: from fffff800db163ee9 to fffff800db1583a0
  151.  
  152. STACK_TEXT:
  153. fffff800`dcbc2128 fffff800`db163ee9 : 00000000`0000000a 00000000`00000018 00000000`00000002 00000000`00000001 : nt!KeBugCheckEx
  154. fffff800`dcbc2130 fffff800`db16273a : 00000000`00000001 00000000`00000000 00000000`00000000 fffff800`db79c58f : nt!KiBugCheckDispatch+0x69
  155. fffff800`dcbc2270 fffff800`7864475a : 00000000`00000000 00000000`00000000 00000000`00000000 fffff800`dcbc2480 : nt!KiPageFault+0x23a
  156. fffff800`dcbc2400 fffff800`7864567d : 00000000`00000000 00000000`00000000 ffffe001`f76d4000 ffffe001`f7969240 : dxgmms1!VidSchiProcessDpcVSyncCookie+0x37a
  157. fffff800`dcbc25e0 fffff800`784b6bba : ffffe001`f5d0a1f0 ffffe001`f2ee9d00 ffffe001`f7848500 ffffe001`f6684000 : dxgmms1!VidSchDdiNotifyDpc+0x13d
  158. fffff800`dcbc2630 fffff800`793338d4 : ffffe001`f2eb8000 fffff800`79391d65 fffff800`dcbc2b20 ffffe001`f2f012c0 : dxgkrnl+0x8bba
  159. fffff800`dcbc2660 fffff800`7939341b : ffffe001`f78484f0 ffffe001`f2ee9d00 fffff800`dcbc2740 00000000`00000058 : atikmdag+0x368d4
  160. fffff800`dcbc2690 fffff800`79395bbf : ffffe001`f7853610 ffffe001`f78484f0 ffffe001`f78484f0 ffffe001`f2ecb000 : atikmdag+0x9641b
  161. fffff800`dcbc26c0 fffff800`793957dd : ffffe001`f2ecb000 fffff800`db35fa00 ffffe001`f2ecdb20 fffff800`db309f10 : atikmdag+0x98bbf
  162. fffff800`dcbc2720 fffff800`7939094e : ffffe001`f2ecb000 fffff800`dcbc2990 fffff800`dcbc2b20 fffff800`db047167 : atikmdag+0x987dd
  163. fffff800`dcbc27b0 fffff800`7932c164 : ffffe001`f663af40 00000000`00000000 ffff1dca`672bbc1a fffff800`dcbc2990 : atikmdag+0x9394e
  164. fffff800`dcbc27e0 fffff800`79036fd8 : ffffe001`f5da82a0 00025c6a`a5d9322c 00000000`00000010 fffff800`00000002 : atikmdag+0x2f164
  165. fffff800`dcbc2810 fffff800`784b6efb : ffffe001`f5d0a340 ffffe001`00000020 0000007f`ffffffff fffff800`7b11a16c : atikmpag+0xbfd8
  166. fffff800`dcbc2840 fffff800`db046c60 : fffff800`db309f00 fffff800`db067c4e 00000000`000053be fffff800`db30c5c0 : dxgkrnl!DpSynchronizeExecution+0x29b
  167. fffff800`dcbc2890 fffff800`db045fa7 : 00000000`00000000 ffffe001`fc332500 fffff800`db307180 fffff800`00000003 : nt!KiExecuteAllDpcs+0x1b0
  168. fffff800`dcbc29e0 fffff800`db15beea : fffff800`db307180 fffff800`db307180 fffff800`db35fa00 ffffe002`014fb080 : nt!KiRetireDpcList+0xd7
  169. fffff800`dcbc2c60 00000000`00000000 : fffff800`dcbc3000 fffff800`dcbbd000 00000000`00000000 00000000`00000000 : nt!KiIdleLoop+0x5a
  170.  
  171.  
  172. STACK_COMMAND: kb
  173.  
  174. THREAD_SHA1_HASH_MOD_FUNC: bbf84b27c0e7dd8f7b6b52eeb47dee4387fc21a9
  175.  
  176. THREAD_SHA1_HASH_MOD_FUNC_OFFSET: 6a6b1a0412d5f6cd44a74b75408e1d117958d92e
  177.  
  178. THREAD_SHA1_HASH_MOD: 0dffd725bbaf8060f9e17f51cbcfa7d29c23c352
  179.  
  180. FOLLOWUP_IP:
  181. dxgmms1!VidSchiProcessDpcVSyncCookie+37a
  182. fffff800`7864475a f049ff4218 lock inc qword ptr [r10+18h]
  183.  
  184. FAULT_INSTR_CODE: 42ff49f0
  185.  
  186. SYMBOL_STACK_INDEX: 3
  187.  
  188. SYMBOL_NAME: dxgmms1!VidSchiProcessDpcVSyncCookie+37a
  189.  
  190. FOLLOWUP_NAME: MachineOwner
  191.  
  192. MODULE_NAME: dxgmms1
  193.  
  194. IMAGE_NAME: dxgmms1.sys
  195.  
  196. DEBUG_FLR_IMAGE_TIMESTAMP: 54505506
  197.  
  198. IMAGE_VERSION: 6.3.9600.17415
  199.  
  200. BUCKET_ID_FUNC_OFFSET: 37a
  201.  
  202. FAILURE_BUCKET_ID: AV_dxgmms1!VidSchiProcessDpcVSyncCookie
  203.  
  204. BUCKET_ID: AV_dxgmms1!VidSchiProcessDpcVSyncCookie
  205.  
  206. PRIMARY_PROBLEM_CLASS: AV_dxgmms1!VidSchiProcessDpcVSyncCookie
  207.  
  208. TARGET_TIME: 2016-11-18T13:01:04.000Z
  209.  
  210. OSBUILD: 9600
  211.  
  212. OSSERVICEPACK: 0
  213.  
  214. SERVICEPACK_NUMBER: 0
  215.  
  216. OS_REVISION: 0
  217.  
  218. SUITE_MASK: 272
  219.  
  220. PRODUCT_TYPE: 1
  221.  
  222. OSPLATFORM_TYPE: x64
  223.  
  224. OSNAME: Windows 8.1
  225.  
  226. OSEDITION: Windows 8.1 WinNt TerminalServer SingleUserTS
  227.  
  228. OS_LOCALE:
  229.  
  230. USER_LCID: 0
  231.  
  232. OSBUILD_TIMESTAMP: 2016-09-30 10:31:28
  233.  
  234. BUILDDATESTAMP_STR: 160930-0600
  235.  
  236. BUILDLAB_STR: winblue_ltsb
  237.  
  238. BUILDOSVER_STR: 6.3.9600.18505.amd64fre.winblue_ltsb.160930-0600
  239.  
  240. ANALYSIS_SESSION_ELAPSED_TIME: 2d53
  241.  
  242. ANALYSIS_SOURCE: KM
  243.  
  244. FAILURE_ID_HASH_STRING: km:av_dxgmms1!vidschiprocessdpcvsynccookie
  245.  
  246. FAILURE_ID_HASH: {1804077a-4f31-7390-769d-6ae6cc8d2e9c}
  247.  
  248. Followup: MachineOwner
  249. ---------
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement