Advertisement
Not a member of Pastebin yet?
Sign Up,
it unlocks many cool features!
- Microsoft (R) Windows Debugger Version 10.0.14321.1024 X86
- Copyright (c) Microsoft Corporation. All rights reserved.
- Loading Dump File [C:\Windows\Minidump\111816-97828-01.dmp]
- Mini Kernel Dump File: Only registers and stack trace are available
- Symbol search path is: srv*
- Executable search path is:
- Windows 8.1 Kernel Version 9600 MP (8 procs) Free x64
- Product: WinNt, suite: TerminalServer SingleUserTS
- Built by: 9600.18505.amd64fre.winblue_ltsb.160930-0600
- Machine Name:
- Kernel base = 0xfffff800`db00a000 PsLoadedModuleList = 0xfffff800`db2dd630
- Debug session time: Fri Nov 18 08:01:04.824 2016 (UTC - 5:00)
- System Uptime: 2 days 17:30:18.465
- Loading Kernel Symbols
- .
- Press ctrl-c (cdb, kd, ntsd) or ctrl-break (windbg) to abort symbol loads that take too long.
- Run !sym noisy before .reload to track down problems loading symbols.
- ..............................................................
- ................................................................
- ..........................................
- Loading User Symbols
- Loading unloaded module list
- ....................
- *******************************************************************************
- * *
- * Bugcheck Analysis *
- * *
- *******************************************************************************
- Use !analyze -v to get detailed debugging information.
- BugCheck D1, {18, 2, 1, fffff8007864475a}
- *** ERROR: Symbol file could not be found. Defaulted to export symbols for dxgkrnl.sys -
- *** WARNING: Unable to verify timestamp for atikmdag.sys
- *** ERROR: Module load completed but symbols could not be loaded for atikmdag.sys
- Probably caused by : dxgmms1.sys ( dxgmms1!VidSchiProcessDpcVSyncCookie+37a )
- Followup: MachineOwner
- ---------
- 0: kd> !analyze -v
- *******************************************************************************
- * *
- * Bugcheck Analysis *
- * *
- *******************************************************************************
- DRIVER_IRQL_NOT_LESS_OR_EQUAL (d1)
- An attempt was made to access a pageable (or completely invalid) address at an
- interrupt request level (IRQL) that is too high. This is usually
- caused by drivers using improper addresses.
- If kernel debugger is available get stack backtrace.
- Arguments:
- Arg1: 0000000000000018, memory referenced
- Arg2: 0000000000000002, IRQL
- Arg3: 0000000000000001, value 0 = read operation, 1 = write operation
- Arg4: fffff8007864475a, address which referenced memory
- Debugging Details:
- ------------------
- DUMP_CLASS: 1
- DUMP_QUALIFIER: 400
- BUILD_VERSION_STRING: 6.3.9600.18505 (winblue_ltsb.160930-0600)
- SYSTEM_MANUFACTURER: ASUS
- SYSTEM_PRODUCT_NAME: All Series
- SYSTEM_SKU: All
- SYSTEM_VERSION: System Version
- BIOS_VENDOR: American Megatrends Inc.
- BIOS_VERSION: 1207
- BIOS_DATE: 07/01/2013
- BASEBOARD_MANUFACTURER: ASUSTeK COMPUTER INC.
- BASEBOARD_PRODUCT: Z87-A
- BASEBOARD_VERSION: Rev 1.xx
- DUMP_TYPE: 2
- BUGCHECK_P1: 18
- BUGCHECK_P2: 2
- BUGCHECK_P3: 1
- BUGCHECK_P4: fffff8007864475a
- WRITE_ADDRESS: GetUlongPtrFromAddress: unable to read from fffff800db366298
- GetUlongPtrFromAddress: unable to read from fffff800db366520
- 0000000000000018
- CURRENT_IRQL: 2
- FAULTING_IP:
- dxgmms1!VidSchiProcessDpcVSyncCookie+37a
- fffff800`7864475a f049ff4218 lock inc qword ptr [r10+18h]
- CPU_COUNT: 8
- CPU_MHZ: db2
- CPU_VENDOR: GenuineIntel
- CPU_FAMILY: 6
- CPU_MODEL: 3c
- CPU_STEPPING: 3
- CPU_MICROCODE: 6,3c,3,0 (F,M,S,R) SIG: 1C'00000000 (cache) 1C'00000000 (init)
- CUSTOMER_CRASH_COUNT: 1
- DEFAULT_BUCKET_ID: WIN8_DRIVER_FAULT
- BUGCHECK_STR: AV
- PROCESS_NAME: System
- ANALYSIS_SESSION_HOST: CORE-SERVICES
- ANALYSIS_SESSION_TIME: 11-18-2016 12:58:53.0719
- ANALYSIS_VERSION: 10.0.14321.1024 x86fre
- TRAP_FRAME: fffff800dcbc2270 -- (.trap 0xfffff800dcbc2270)
- NOTE: The trap frame does not contain all registers.
- Some register values may be zeroed or incorrect.
- rax=00000000fffffffe rbx=0000000000000000 rcx=0000000000000000
- rdx=0000000000000001 rsi=0000000000000000 rdi=0000000000000000
- rip=fffff8007864475a rsp=fffff800dcbc2400 rbp=fffff800dcbc2480
- r8=ffffe001f9ed2b00 r9=ffffe001f33ba110 r10=0000000000000000
- r11=0000000000000000 r12=0000000000000000 r13=0000000000000000
- r14=0000000000000000 r15=0000000000000000
- iopl=0 nv up ei pl zr na po nc
- dxgmms1!VidSchiProcessDpcVSyncCookie+0x37a:
- fffff800`7864475a f049ff4218 lock inc qword ptr [r10+18h] ds:00000000`00000018=????????????????
- Resetting default scope
- LAST_CONTROL_TRANSFER: from fffff800db163ee9 to fffff800db1583a0
- STACK_TEXT:
- fffff800`dcbc2128 fffff800`db163ee9 : 00000000`0000000a 00000000`00000018 00000000`00000002 00000000`00000001 : nt!KeBugCheckEx
- fffff800`dcbc2130 fffff800`db16273a : 00000000`00000001 00000000`00000000 00000000`00000000 fffff800`db79c58f : nt!KiBugCheckDispatch+0x69
- fffff800`dcbc2270 fffff800`7864475a : 00000000`00000000 00000000`00000000 00000000`00000000 fffff800`dcbc2480 : nt!KiPageFault+0x23a
- fffff800`dcbc2400 fffff800`7864567d : 00000000`00000000 00000000`00000000 ffffe001`f76d4000 ffffe001`f7969240 : dxgmms1!VidSchiProcessDpcVSyncCookie+0x37a
- fffff800`dcbc25e0 fffff800`784b6bba : ffffe001`f5d0a1f0 ffffe001`f2ee9d00 ffffe001`f7848500 ffffe001`f6684000 : dxgmms1!VidSchDdiNotifyDpc+0x13d
- fffff800`dcbc2630 fffff800`793338d4 : ffffe001`f2eb8000 fffff800`79391d65 fffff800`dcbc2b20 ffffe001`f2f012c0 : dxgkrnl+0x8bba
- fffff800`dcbc2660 ffffe001`f2eb8000 : fffff800`79391d65 fffff800`dcbc2b20 ffffe001`f2f012c0 ffffe001`f2ecb000 : atikmdag+0x368d4
- fffff800`dcbc2668 fffff800`79391d65 : fffff800`dcbc2b20 ffffe001`f2f012c0 ffffe001`f2ecb000 fffff800`7939341b : 0xffffe001`f2eb8000
- fffff800`dcbc2670 fffff800`dcbc2b20 : ffffe001`f2f012c0 ffffe001`f2ecb000 fffff800`7939341b ffffe001`f78484f0 : atikmdag+0x94d65
- fffff800`dcbc2678 ffffe001`f2f012c0 : ffffe001`f2ecb000 fffff800`7939341b ffffe001`f78484f0 ffffe001`f2ee9d00 : 0xfffff800`dcbc2b20
- fffff800`dcbc2680 ffffe001`f2ecb000 : fffff800`7939341b ffffe001`f78484f0 ffffe001`f2ee9d00 fffff800`dcbc2740 : 0xffffe001`f2f012c0
- fffff800`dcbc2688 fffff800`7939341b : ffffe001`f78484f0 ffffe001`f2ee9d00 fffff800`dcbc2740 00000000`00000058 : 0xffffe001`f2ecb000
- fffff800`dcbc2690 ffffe001`f78484f0 : ffffe001`f2ee9d00 fffff800`dcbc2740 00000000`00000058 ffffe001`f2ecb000 : atikmdag+0x9641b
- fffff800`dcbc2698 ffffe001`f2ee9d00 : fffff800`dcbc2740 00000000`00000058 ffffe001`f2ecb000 fffff800`79395bbf : 0xffffe001`f78484f0
- fffff800`dcbc26a0 fffff800`dcbc2740 : 00000000`00000058 ffffe001`f2ecb000 fffff800`79395bbf ffffe001`f7853610 : 0xffffe001`f2ee9d00
- fffff800`dcbc26a8 00000000`00000058 : ffffe001`f2ecb000 fffff800`79395bbf ffffe001`f7853610 ffffe001`f78484f0 : 0xfffff800`dcbc2740
- fffff800`dcbc26b0 ffffe001`f2ecb000 : fffff800`79395bbf ffffe001`f7853610 ffffe001`f78484f0 ffffe001`f78484f0 : 0x58
- fffff800`dcbc26b8 fffff800`79395bbf : ffffe001`f7853610 ffffe001`f78484f0 ffffe001`f78484f0 ffffe001`f2ecb000 : 0xffffe001`f2ecb000
- fffff800`dcbc26c0 ffffe001`f7853610 : ffffe001`f78484f0 ffffe001`f78484f0 ffffe001`f2ecb000 00000000`00000000 : atikmdag+0x98bbf
- fffff800`dcbc26c8 ffffe001`f78484f0 : ffffe001`f78484f0 ffffe001`f2ecb000 00000000`00000000 ffffe001`f7853630 : 0xffffe001`f7853610
- fffff800`dcbc26d0 ffffe001`f78484f0 : ffffe001`f2ecb000 00000000`00000000 ffffe001`f7853630 00000000`00000000 : 0xffffe001`f78484f0
- fffff800`dcbc26d8 ffffe001`f2ecb000 : 00000000`00000000 ffffe001`f7853630 00000000`00000000 00000000`00000000 : 0xffffe001`f78484f0
- fffff800`dcbc26e0 00000000`00000000 : ffffe001`f7853630 00000000`00000000 00000000`00000000 00000000`00000000 : 0xffffe001`f2ecb000
- STACK_COMMAND: kb
- THREAD_SHA1_HASH_MOD_FUNC: 04440e8b6a4bc7a9f9d1448e3b9dcd52942a934f
- THREAD_SHA1_HASH_MOD_FUNC_OFFSET: 426fb110319a0d79a6ab07930c188504e34e45dd
- THREAD_SHA1_HASH_MOD: f45ecf32f06881a49f299f0b228b913e329067b4
- FOLLOWUP_IP:
- dxgmms1!VidSchiProcessDpcVSyncCookie+37a
- fffff800`7864475a f049ff4218 lock inc qword ptr [r10+18h]
- FAULT_INSTR_CODE: 42ff49f0
- SYMBOL_STACK_INDEX: 3
- SYMBOL_NAME: dxgmms1!VidSchiProcessDpcVSyncCookie+37a
- FOLLOWUP_NAME: MachineOwner
- MODULE_NAME: dxgmms1
- IMAGE_NAME: dxgmms1.sys
- DEBUG_FLR_IMAGE_TIMESTAMP: 54505506
- IMAGE_VERSION: 6.3.9600.17415
- BUCKET_ID_FUNC_OFFSET: 37a
- FAILURE_BUCKET_ID: AV_dxgmms1!VidSchiProcessDpcVSyncCookie
- BUCKET_ID: AV_dxgmms1!VidSchiProcessDpcVSyncCookie
- PRIMARY_PROBLEM_CLASS: AV_dxgmms1!VidSchiProcessDpcVSyncCookie
- TARGET_TIME: 2016-11-18T13:01:04.000Z
- OSBUILD: 9600
- OSSERVICEPACK: 18505
- SERVICEPACK_NUMBER: 0
- OS_REVISION: 0
- SUITE_MASK: 272
- PRODUCT_TYPE: 1
- OSPLATFORM_TYPE: x64
- OSNAME: Windows 8.1
- OSEDITION: Windows 8.1 WinNt TerminalServer SingleUserTS
- OS_LOCALE:
- USER_LCID: 0
- OSBUILD_TIMESTAMP: 2016-09-30 10:31:28
- BUILDDATESTAMP_STR: 160930-0600
- BUILDLAB_STR: winblue_ltsb
- BUILDOSVER_STR: 6.3.9600.18505
- ANALYSIS_SESSION_ELAPSED_TIME: 5c0
- ANALYSIS_SOURCE: KM
- FAILURE_ID_HASH_STRING: km:av_dxgmms1!vidschiprocessdpcvsynccookie
- FAILURE_ID_HASH: {1804077a-4f31-7390-769d-6ae6cc8d2e9c}
- Followup: MachineOwner
- ---------
- 0: kd> !analyze -v
- *******************************************************************************
- * *
- * Bugcheck Analysis *
- * *
- *******************************************************************************
- DRIVER_IRQL_NOT_LESS_OR_EQUAL (d1)
- An attempt was made to access a pageable (or completely invalid) address at an
- interrupt request level (IRQL) that is too high. This is usually
- caused by drivers using improper addresses.
- If kernel debugger is available get stack backtrace.
- Arguments:
- Arg1: 0000000000000018, memory referenced
- Arg2: 0000000000000002, IRQL
- Arg3: 0000000000000001, value 0 = read operation, 1 = write operation
- Arg4: fffff8007864475a, address which referenced memory
- Debugging Details:
- ------------------
- DUMP_CLASS: 1
- DUMP_QUALIFIER: 400
- BUILD_VERSION_STRING: 6.3.9600.18505 (winblue_ltsb.160930-0600)
- SYSTEM_MANUFACTURER: ASUS
- SYSTEM_PRODUCT_NAME: All Series
- SYSTEM_SKU: All
- SYSTEM_VERSION: System Version
- BIOS_VENDOR: American Megatrends Inc.
- BIOS_VERSION: 1207
- BIOS_DATE: 07/01/2013
- BASEBOARD_MANUFACTURER: ASUSTeK COMPUTER INC.
- BASEBOARD_PRODUCT: Z87-A
- BASEBOARD_VERSION: Rev 1.xx
- DUMP_TYPE: 2
- BUGCHECK_P1: 18
- BUGCHECK_P2: 2
- BUGCHECK_P3: 1
- BUGCHECK_P4: fffff8007864475a
- WRITE_ADDRESS: GetUlongPtrFromAddress: unable to read from fffff800db366298
- GetUlongPtrFromAddress: unable to read from fffff800db366520
- 0000000000000018
- CURRENT_IRQL: 2
- FAULTING_IP:
- dxgmms1!VidSchiProcessDpcVSyncCookie+37a
- fffff800`7864475a f049ff4218 lock inc qword ptr [r10+18h]
- CPU_COUNT: 8
- CPU_MHZ: db2
- CPU_VENDOR: GenuineIntel
- CPU_FAMILY: 6
- CPU_MODEL: 3c
- CPU_STEPPING: 3
- CPU_MICROCODE: 6,3c,3,0 (F,M,S,R) SIG: 1C'00000000 (cache) 1C'00000000 (init)
- CUSTOMER_CRASH_COUNT: 1
- DEFAULT_BUCKET_ID: WIN8_DRIVER_FAULT
- BUGCHECK_STR: AV
- PROCESS_NAME: System
- ANALYSIS_SESSION_HOST: CORE-SERVICES
- ANALYSIS_SESSION_TIME: 11-18-2016 12:58:55.0354
- ANALYSIS_VERSION: 10.0.14321.1024 x86fre
- TRAP_FRAME: fffff800dcbc2270 -- (.trap 0xfffff800dcbc2270)
- NOTE: The trap frame does not contain all registers.
- Some register values may be zeroed or incorrect.
- rax=00000000fffffffe rbx=0000000000000000 rcx=0000000000000000
- rdx=0000000000000001 rsi=0000000000000000 rdi=0000000000000000
- rip=fffff8007864475a rsp=fffff800dcbc2400 rbp=fffff800dcbc2480
- r8=ffffe001f9ed2b00 r9=ffffe001f33ba110 r10=0000000000000000
- r11=0000000000000000 r12=0000000000000000 r13=0000000000000000
- r14=0000000000000000 r15=0000000000000000
- iopl=0 nv up ei pl zr na po nc
- dxgmms1!VidSchiProcessDpcVSyncCookie+0x37a:
- fffff800`7864475a f049ff4218 lock inc qword ptr [r10+18h] ds:00000000`00000018=????????????????
- Resetting default scope
- LAST_CONTROL_TRANSFER: from fffff800db163ee9 to fffff800db1583a0
- STACK_TEXT:
- fffff800`dcbc2128 fffff800`db163ee9 : 00000000`0000000a 00000000`00000018 00000000`00000002 00000000`00000001 : nt!KeBugCheckEx
- fffff800`dcbc2130 fffff800`db16273a : 00000000`00000001 00000000`00000000 00000000`00000000 fffff800`db79c58f : nt!KiBugCheckDispatch+0x69
- fffff800`dcbc2270 fffff800`7864475a : 00000000`00000000 00000000`00000000 00000000`00000000 fffff800`dcbc2480 : nt!KiPageFault+0x23a
- fffff800`dcbc2400 fffff800`7864567d : 00000000`00000000 00000000`00000000 ffffe001`f76d4000 ffffe001`f7969240 : dxgmms1!VidSchiProcessDpcVSyncCookie+0x37a
- fffff800`dcbc25e0 fffff800`784b6bba : ffffe001`f5d0a1f0 ffffe001`f2ee9d00 ffffe001`f7848500 ffffe001`f6684000 : dxgmms1!VidSchDdiNotifyDpc+0x13d
- fffff800`dcbc2630 fffff800`793338d4 : ffffe001`f2eb8000 fffff800`79391d65 fffff800`dcbc2b20 ffffe001`f2f012c0 : dxgkrnl+0x8bba
- fffff800`dcbc2660 ffffe001`f2eb8000 : fffff800`79391d65 fffff800`dcbc2b20 ffffe001`f2f012c0 ffffe001`f2ecb000 : atikmdag+0x368d4
- fffff800`dcbc2668 fffff800`79391d65 : fffff800`dcbc2b20 ffffe001`f2f012c0 ffffe001`f2ecb000 fffff800`7939341b : 0xffffe001`f2eb8000
- fffff800`dcbc2670 fffff800`dcbc2b20 : ffffe001`f2f012c0 ffffe001`f2ecb000 fffff800`7939341b ffffe001`f78484f0 : atikmdag+0x94d65
- fffff800`dcbc2678 ffffe001`f2f012c0 : ffffe001`f2ecb000 fffff800`7939341b ffffe001`f78484f0 ffffe001`f2ee9d00 : 0xfffff800`dcbc2b20
- fffff800`dcbc2680 ffffe001`f2ecb000 : fffff800`7939341b ffffe001`f78484f0 ffffe001`f2ee9d00 fffff800`dcbc2740 : 0xffffe001`f2f012c0
- fffff800`dcbc2688 fffff800`7939341b : ffffe001`f78484f0 ffffe001`f2ee9d00 fffff800`dcbc2740 00000000`00000058 : 0xffffe001`f2ecb000
- fffff800`dcbc2690 ffffe001`f78484f0 : ffffe001`f2ee9d00 fffff800`dcbc2740 00000000`00000058 ffffe001`f2ecb000 : atikmdag+0x9641b
- fffff800`dcbc2698 ffffe001`f2ee9d00 : fffff800`dcbc2740 00000000`00000058 ffffe001`f2ecb000 fffff800`79395bbf : 0xffffe001`f78484f0
- fffff800`dcbc26a0 fffff800`dcbc2740 : 00000000`00000058 ffffe001`f2ecb000 fffff800`79395bbf ffffe001`f7853610 : 0xffffe001`f2ee9d00
- fffff800`dcbc26a8 00000000`00000058 : ffffe001`f2ecb000 fffff800`79395bbf ffffe001`f7853610 ffffe001`f78484f0 : 0xfffff800`dcbc2740
- fffff800`dcbc26b0 ffffe001`f2ecb000 : fffff800`79395bbf ffffe001`f7853610 ffffe001`f78484f0 ffffe001`f78484f0 : 0x58
- fffff800`dcbc26b8 fffff800`79395bbf : ffffe001`f7853610 ffffe001`f78484f0 ffffe001`f78484f0 ffffe001`f2ecb000 : 0xffffe001`f2ecb000
- fffff800`dcbc26c0 ffffe001`f7853610 : ffffe001`f78484f0 ffffe001`f78484f0 ffffe001`f2ecb000 00000000`00000000 : atikmdag+0x98bbf
- fffff800`dcbc26c8 ffffe001`f78484f0 : ffffe001`f78484f0 ffffe001`f2ecb000 00000000`00000000 ffffe001`f7853630 : 0xffffe001`f7853610
- fffff800`dcbc26d0 ffffe001`f78484f0 : ffffe001`f2ecb000 00000000`00000000 ffffe001`f7853630 00000000`00000000 : 0xffffe001`f78484f0
- fffff800`dcbc26d8 ffffe001`f2ecb000 : 00000000`00000000 ffffe001`f7853630 00000000`00000000 00000000`00000000 : 0xffffe001`f78484f0
- fffff800`dcbc26e0 00000000`00000000 : ffffe001`f7853630 00000000`00000000 00000000`00000000 00000000`00000000 : 0xffffe001`f2ecb000
- STACK_COMMAND: kb
- THREAD_SHA1_HASH_MOD_FUNC: 04440e8b6a4bc7a9f9d1448e3b9dcd52942a934f
- THREAD_SHA1_HASH_MOD_FUNC_OFFSET: 426fb110319a0d79a6ab07930c188504e34e45dd
- THREAD_SHA1_HASH_MOD: f45ecf32f06881a49f299f0b228b913e329067b4
- FOLLOWUP_IP:
- dxgmms1!VidSchiProcessDpcVSyncCookie+37a
- fffff800`7864475a f049ff4218 lock inc qword ptr [r10+18h]
- FAULT_INSTR_CODE: 42ff49f0
- SYMBOL_STACK_INDEX: 3
- SYMBOL_NAME: dxgmms1!VidSchiProcessDpcVSyncCookie+37a
- FOLLOWUP_NAME: MachineOwner
- MODULE_NAME: dxgmms1
- IMAGE_NAME: dxgmms1.sys
- DEBUG_FLR_IMAGE_TIMESTAMP: 54505506
- IMAGE_VERSION: 6.3.9600.17415
- BUCKET_ID_FUNC_OFFSET: 37a
- FAILURE_BUCKET_ID: AV_dxgmms1!VidSchiProcessDpcVSyncCookie
- BUCKET_ID: AV_dxgmms1!VidSchiProcessDpcVSyncCookie
- PRIMARY_PROBLEM_CLASS: AV_dxgmms1!VidSchiProcessDpcVSyncCookie
- TARGET_TIME: 2016-11-18T13:01:04.000Z
- OSBUILD: 9600
- OSSERVICEPACK: 18505
- SERVICEPACK_NUMBER: 0
- OS_REVISION: 0
- SUITE_MASK: 272
- PRODUCT_TYPE: 1
- OSPLATFORM_TYPE: x64
- OSNAME: Windows 8.1
- OSEDITION: Windows 8.1 WinNt TerminalServer SingleUserTS
- OS_LOCALE:
- USER_LCID: 0
- OSBUILD_TIMESTAMP: 2016-09-30 10:31:28
- BUILDDATESTAMP_STR: 160930-0600
- BUILDLAB_STR: winblue_ltsb
- BUILDOSVER_STR: 6.3.9600.18505
- ANALYSIS_SESSION_ELAPSED_TIME: 5c4
- ANALYSIS_SOURCE: KM
- FAILURE_ID_HASH_STRING: km:av_dxgmms1!vidschiprocessdpcvsynccookie
- FAILURE_ID_HASH: {1804077a-4f31-7390-769d-6ae6cc8d2e9c}
- Followup: MachineOwner
- ---------
- 0: kd> !analyze -v
- *******************************************************************************
- * *
- * Bugcheck Analysis *
- * *
- *******************************************************************************
- DRIVER_IRQL_NOT_LESS_OR_EQUAL (d1)
- An attempt was made to access a pageable (or completely invalid) address at an
- interrupt request level (IRQL) that is too high. This is usually
- caused by drivers using improper addresses.
- If kernel debugger is available get stack backtrace.
- Arguments:
- Arg1: 0000000000000018, memory referenced
- Arg2: 0000000000000002, IRQL
- Arg3: 0000000000000001, value 0 = read operation, 1 = write operation
- Arg4: fffff8007864475a, address which referenced memory
- Debugging Details:
- ------------------
- DUMP_CLASS: 1
- DUMP_QUALIFIER: 400
- BUILD_VERSION_STRING: 6.3.9600.18505 (winblue_ltsb.160930-0600)
- SYSTEM_MANUFACTURER: ASUS
- SYSTEM_PRODUCT_NAME: All Series
- SYSTEM_SKU: All
- SYSTEM_VERSION: System Version
- BIOS_VENDOR: American Megatrends Inc.
- BIOS_VERSION: 1207
- BIOS_DATE: 07/01/2013
- BASEBOARD_MANUFACTURER: ASUSTeK COMPUTER INC.
- BASEBOARD_PRODUCT: Z87-A
- BASEBOARD_VERSION: Rev 1.xx
- DUMP_TYPE: 2
- BUGCHECK_P1: 18
- BUGCHECK_P2: 2
- BUGCHECK_P3: 1
- BUGCHECK_P4: fffff8007864475a
- WRITE_ADDRESS: GetUlongPtrFromAddress: unable to read from fffff800db366298
- GetUlongPtrFromAddress: unable to read from fffff800db366520
- 0000000000000018
- CURRENT_IRQL: 2
- FAULTING_IP:
- dxgmms1!VidSchiProcessDpcVSyncCookie+37a
- fffff800`7864475a f049ff4218 lock inc qword ptr [r10+18h]
- CPU_COUNT: 8
- CPU_MHZ: db2
- CPU_VENDOR: GenuineIntel
- CPU_FAMILY: 6
- CPU_MODEL: 3c
- CPU_STEPPING: 3
- CPU_MICROCODE: 6,3c,3,0 (F,M,S,R) SIG: 1C'00000000 (cache) 1C'00000000 (init)
- CUSTOMER_CRASH_COUNT: 1
- DEFAULT_BUCKET_ID: WIN8_DRIVER_FAULT
- BUGCHECK_STR: AV
- PROCESS_NAME: System
- ANALYSIS_SESSION_HOST: CORE-SERVICES
- ANALYSIS_SESSION_TIME: 11-18-2016 12:58:56.0995
- ANALYSIS_VERSION: 10.0.14321.1024 x86fre
- TRAP_FRAME: fffff800dcbc2270 -- (.trap 0xfffff800dcbc2270)
- NOTE: The trap frame does not contain all registers.
- Some register values may be zeroed or incorrect.
- rax=00000000fffffffe rbx=0000000000000000 rcx=0000000000000000
- rdx=0000000000000001 rsi=0000000000000000 rdi=0000000000000000
- rip=fffff8007864475a rsp=fffff800dcbc2400 rbp=fffff800dcbc2480
- r8=ffffe001f9ed2b00 r9=ffffe001f33ba110 r10=0000000000000000
- r11=0000000000000000 r12=0000000000000000 r13=0000000000000000
- r14=0000000000000000 r15=0000000000000000
- iopl=0 nv up ei pl zr na po nc
- dxgmms1!VidSchiProcessDpcVSyncCookie+0x37a:
- fffff800`7864475a f049ff4218 lock inc qword ptr [r10+18h] ds:00000000`00000018=????????????????
- Resetting default scope
- LAST_CONTROL_TRANSFER: from fffff800db163ee9 to fffff800db1583a0
- STACK_TEXT:
- fffff800`dcbc2128 fffff800`db163ee9 : 00000000`0000000a 00000000`00000018 00000000`00000002 00000000`00000001 : nt!KeBugCheckEx
- fffff800`dcbc2130 fffff800`db16273a : 00000000`00000001 00000000`00000000 00000000`00000000 fffff800`db79c58f : nt!KiBugCheckDispatch+0x69
- fffff800`dcbc2270 fffff800`7864475a : 00000000`00000000 00000000`00000000 00000000`00000000 fffff800`dcbc2480 : nt!KiPageFault+0x23a
- fffff800`dcbc2400 fffff800`7864567d : 00000000`00000000 00000000`00000000 ffffe001`f76d4000 ffffe001`f7969240 : dxgmms1!VidSchiProcessDpcVSyncCookie+0x37a
- fffff800`dcbc25e0 fffff800`784b6bba : ffffe001`f5d0a1f0 ffffe001`f2ee9d00 ffffe001`f7848500 ffffe001`f6684000 : dxgmms1!VidSchDdiNotifyDpc+0x13d
- fffff800`dcbc2630 fffff800`793338d4 : ffffe001`f2eb8000 fffff800`79391d65 fffff800`dcbc2b20 ffffe001`f2f012c0 : dxgkrnl+0x8bba
- fffff800`dcbc2660 ffffe001`f2eb8000 : fffff800`79391d65 fffff800`dcbc2b20 ffffe001`f2f012c0 ffffe001`f2ecb000 : atikmdag+0x368d4
- fffff800`dcbc2668 fffff800`79391d65 : fffff800`dcbc2b20 ffffe001`f2f012c0 ffffe001`f2ecb000 fffff800`7939341b : 0xffffe001`f2eb8000
- fffff800`dcbc2670 fffff800`dcbc2b20 : ffffe001`f2f012c0 ffffe001`f2ecb000 fffff800`7939341b ffffe001`f78484f0 : atikmdag+0x94d65
- fffff800`dcbc2678 ffffe001`f2f012c0 : ffffe001`f2ecb000 fffff800`7939341b ffffe001`f78484f0 ffffe001`f2ee9d00 : 0xfffff800`dcbc2b20
- fffff800`dcbc2680 ffffe001`f2ecb000 : fffff800`7939341b ffffe001`f78484f0 ffffe001`f2ee9d00 fffff800`dcbc2740 : 0xffffe001`f2f012c0
- fffff800`dcbc2688 fffff800`7939341b : ffffe001`f78484f0 ffffe001`f2ee9d00 fffff800`dcbc2740 00000000`00000058 : 0xffffe001`f2ecb000
- fffff800`dcbc2690 ffffe001`f78484f0 : ffffe001`f2ee9d00 fffff800`dcbc2740 00000000`00000058 ffffe001`f2ecb000 : atikmdag+0x9641b
- fffff800`dcbc2698 ffffe001`f2ee9d00 : fffff800`dcbc2740 00000000`00000058 ffffe001`f2ecb000 fffff800`79395bbf : 0xffffe001`f78484f0
- fffff800`dcbc26a0 fffff800`dcbc2740 : 00000000`00000058 ffffe001`f2ecb000 fffff800`79395bbf ffffe001`f7853610 : 0xffffe001`f2ee9d00
- fffff800`dcbc26a8 00000000`00000058 : ffffe001`f2ecb000 fffff800`79395bbf ffffe001`f7853610 ffffe001`f78484f0 : 0xfffff800`dcbc2740
- fffff800`dcbc26b0 ffffe001`f2ecb000 : fffff800`79395bbf ffffe001`f7853610 ffffe001`f78484f0 ffffe001`f78484f0 : 0x58
- fffff800`dcbc26b8 fffff800`79395bbf : ffffe001`f7853610 ffffe001`f78484f0 ffffe001`f78484f0 ffffe001`f2ecb000 : 0xffffe001`f2ecb000
- fffff800`dcbc26c0 ffffe001`f7853610 : ffffe001`f78484f0 ffffe001`f78484f0 ffffe001`f2ecb000 00000000`00000000 : atikmdag+0x98bbf
- fffff800`dcbc26c8 ffffe001`f78484f0 : ffffe001`f78484f0 ffffe001`f2ecb000 00000000`00000000 ffffe001`f7853630 : 0xffffe001`f7853610
- fffff800`dcbc26d0 ffffe001`f78484f0 : ffffe001`f2ecb000 00000000`00000000 ffffe001`f7853630 00000000`00000000 : 0xffffe001`f78484f0
- fffff800`dcbc26d8 ffffe001`f2ecb000 : 00000000`00000000 ffffe001`f7853630 00000000`00000000 00000000`00000000 : 0xffffe001`f78484f0
- fffff800`dcbc26e0 00000000`00000000 : ffffe001`f7853630 00000000`00000000 00000000`00000000 00000000`00000000 : 0xffffe001`f2ecb000
- STACK_COMMAND: kb
- THREAD_SHA1_HASH_MOD_FUNC: 04440e8b6a4bc7a9f9d1448e3b9dcd52942a934f
- THREAD_SHA1_HASH_MOD_FUNC_OFFSET: 426fb110319a0d79a6ab07930c188504e34e45dd
- THREAD_SHA1_HASH_MOD: f45ecf32f06881a49f299f0b228b913e329067b4
- FOLLOWUP_IP:
- dxgmms1!VidSchiProcessDpcVSyncCookie+37a
- fffff800`7864475a f049ff4218 lock inc qword ptr [r10+18h]
- FAULT_INSTR_CODE: 42ff49f0
- SYMBOL_STACK_INDEX: 3
- SYMBOL_NAME: dxgmms1!VidSchiProcessDpcVSyncCookie+37a
- FOLLOWUP_NAME: MachineOwner
- MODULE_NAME: dxgmms1
- IMAGE_NAME: dxgmms1.sys
- DEBUG_FLR_IMAGE_TIMESTAMP: 54505506
- IMAGE_VERSION: 6.3.9600.17415
- BUCKET_ID_FUNC_OFFSET: 37a
- FAILURE_BUCKET_ID: AV_dxgmms1!VidSchiProcessDpcVSyncCookie
- BUCKET_ID: AV_dxgmms1!VidSchiProcessDpcVSyncCookie
- PRIMARY_PROBLEM_CLASS: AV_dxgmms1!VidSchiProcessDpcVSyncCookie
- TARGET_TIME: 2016-11-18T13:01:04.000Z
- OSBUILD: 9600
- OSSERVICEPACK: 18505
- SERVICEPACK_NUMBER: 0
- OS_REVISION: 0
- SUITE_MASK: 272
- PRODUCT_TYPE: 1
- OSPLATFORM_TYPE: x64
- OSNAME: Windows 8.1
- OSEDITION: Windows 8.1 WinNt TerminalServer SingleUserTS
- OS_LOCALE:
- USER_LCID: 0
- OSBUILD_TIMESTAMP: 2016-09-30 10:31:28
- BUILDDATESTAMP_STR: 160930-0600
- BUILDLAB_STR: winblue_ltsb
- BUILDOSVER_STR: 6.3.9600.18505
- ANALYSIS_SESSION_ELAPSED_TIME: 5c0
- ANALYSIS_SOURCE: KM
- FAILURE_ID_HASH_STRING: km:av_dxgmms1!vidschiprocessdpcvsynccookie
- FAILURE_ID_HASH: {1804077a-4f31-7390-769d-6ae6cc8d2e9c}
- Followup: MachineOwner
- ---------
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement