Advertisement
Guest User

Untitled

a guest
Nov 18th, 2016
47
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
text 24.48 KB | None | 0 0
  1.  
  2. Microsoft (R) Windows Debugger Version 10.0.14321.1024 X86
  3. Copyright (c) Microsoft Corporation. All rights reserved.
  4.  
  5.  
  6. Loading Dump File [C:\Windows\Minidump\111816-97828-01.dmp]
  7. Mini Kernel Dump File: Only registers and stack trace are available
  8.  
  9. Symbol search path is: srv*
  10. Executable search path is:
  11. Windows 8.1 Kernel Version 9600 MP (8 procs) Free x64
  12. Product: WinNt, suite: TerminalServer SingleUserTS
  13. Built by: 9600.18505.amd64fre.winblue_ltsb.160930-0600
  14. Machine Name:
  15. Kernel base = 0xfffff800`db00a000 PsLoadedModuleList = 0xfffff800`db2dd630
  16. Debug session time: Fri Nov 18 08:01:04.824 2016 (UTC - 5:00)
  17. System Uptime: 2 days 17:30:18.465
  18. Loading Kernel Symbols
  19. .
  20.  
  21. Press ctrl-c (cdb, kd, ntsd) or ctrl-break (windbg) to abort symbol loads that take too long.
  22. Run !sym noisy before .reload to track down problems loading symbols.
  23.  
  24. ..............................................................
  25. ................................................................
  26. ..........................................
  27. Loading User Symbols
  28. Loading unloaded module list
  29. ....................
  30. *******************************************************************************
  31. * *
  32. * Bugcheck Analysis *
  33. * *
  34. *******************************************************************************
  35.  
  36. Use !analyze -v to get detailed debugging information.
  37.  
  38. BugCheck D1, {18, 2, 1, fffff8007864475a}
  39.  
  40. *** ERROR: Symbol file could not be found. Defaulted to export symbols for dxgkrnl.sys -
  41. *** WARNING: Unable to verify timestamp for atikmdag.sys
  42. *** ERROR: Module load completed but symbols could not be loaded for atikmdag.sys
  43. Probably caused by : dxgmms1.sys ( dxgmms1!VidSchiProcessDpcVSyncCookie+37a )
  44.  
  45. Followup: MachineOwner
  46. ---------
  47.  
  48. 0: kd> !analyze -v
  49. *******************************************************************************
  50. * *
  51. * Bugcheck Analysis *
  52. * *
  53. *******************************************************************************
  54.  
  55. DRIVER_IRQL_NOT_LESS_OR_EQUAL (d1)
  56. An attempt was made to access a pageable (or completely invalid) address at an
  57. interrupt request level (IRQL) that is too high. This is usually
  58. caused by drivers using improper addresses.
  59. If kernel debugger is available get stack backtrace.
  60. Arguments:
  61. Arg1: 0000000000000018, memory referenced
  62. Arg2: 0000000000000002, IRQL
  63. Arg3: 0000000000000001, value 0 = read operation, 1 = write operation
  64. Arg4: fffff8007864475a, address which referenced memory
  65.  
  66. Debugging Details:
  67. ------------------
  68.  
  69.  
  70. DUMP_CLASS: 1
  71.  
  72. DUMP_QUALIFIER: 400
  73.  
  74. BUILD_VERSION_STRING: 6.3.9600.18505 (winblue_ltsb.160930-0600)
  75.  
  76. SYSTEM_MANUFACTURER: ASUS
  77.  
  78. SYSTEM_PRODUCT_NAME: All Series
  79.  
  80. SYSTEM_SKU: All
  81.  
  82. SYSTEM_VERSION: System Version
  83.  
  84. BIOS_VENDOR: American Megatrends Inc.
  85.  
  86. BIOS_VERSION: 1207
  87.  
  88. BIOS_DATE: 07/01/2013
  89.  
  90. BASEBOARD_MANUFACTURER: ASUSTeK COMPUTER INC.
  91.  
  92. BASEBOARD_PRODUCT: Z87-A
  93.  
  94. BASEBOARD_VERSION: Rev 1.xx
  95.  
  96. DUMP_TYPE: 2
  97.  
  98. BUGCHECK_P1: 18
  99.  
  100. BUGCHECK_P2: 2
  101.  
  102. BUGCHECK_P3: 1
  103.  
  104. BUGCHECK_P4: fffff8007864475a
  105.  
  106. WRITE_ADDRESS: GetUlongPtrFromAddress: unable to read from fffff800db366298
  107. GetUlongPtrFromAddress: unable to read from fffff800db366520
  108. 0000000000000018
  109.  
  110. CURRENT_IRQL: 2
  111.  
  112. FAULTING_IP:
  113. dxgmms1!VidSchiProcessDpcVSyncCookie+37a
  114. fffff800`7864475a f049ff4218 lock inc qword ptr [r10+18h]
  115.  
  116. CPU_COUNT: 8
  117.  
  118. CPU_MHZ: db2
  119.  
  120. CPU_VENDOR: GenuineIntel
  121.  
  122. CPU_FAMILY: 6
  123.  
  124. CPU_MODEL: 3c
  125.  
  126. CPU_STEPPING: 3
  127.  
  128. CPU_MICROCODE: 6,3c,3,0 (F,M,S,R) SIG: 1C'00000000 (cache) 1C'00000000 (init)
  129.  
  130. CUSTOMER_CRASH_COUNT: 1
  131.  
  132. DEFAULT_BUCKET_ID: WIN8_DRIVER_FAULT
  133.  
  134. BUGCHECK_STR: AV
  135.  
  136. PROCESS_NAME: System
  137.  
  138. ANALYSIS_SESSION_HOST: CORE-SERVICES
  139.  
  140. ANALYSIS_SESSION_TIME: 11-18-2016 12:58:53.0719
  141.  
  142. ANALYSIS_VERSION: 10.0.14321.1024 x86fre
  143.  
  144. TRAP_FRAME: fffff800dcbc2270 -- (.trap 0xfffff800dcbc2270)
  145. NOTE: The trap frame does not contain all registers.
  146. Some register values may be zeroed or incorrect.
  147. rax=00000000fffffffe rbx=0000000000000000 rcx=0000000000000000
  148. rdx=0000000000000001 rsi=0000000000000000 rdi=0000000000000000
  149. rip=fffff8007864475a rsp=fffff800dcbc2400 rbp=fffff800dcbc2480
  150. r8=ffffe001f9ed2b00 r9=ffffe001f33ba110 r10=0000000000000000
  151. r11=0000000000000000 r12=0000000000000000 r13=0000000000000000
  152. r14=0000000000000000 r15=0000000000000000
  153. iopl=0 nv up ei pl zr na po nc
  154. dxgmms1!VidSchiProcessDpcVSyncCookie+0x37a:
  155. fffff800`7864475a f049ff4218 lock inc qword ptr [r10+18h] ds:00000000`00000018=????????????????
  156. Resetting default scope
  157.  
  158. LAST_CONTROL_TRANSFER: from fffff800db163ee9 to fffff800db1583a0
  159.  
  160. STACK_TEXT:
  161. fffff800`dcbc2128 fffff800`db163ee9 : 00000000`0000000a 00000000`00000018 00000000`00000002 00000000`00000001 : nt!KeBugCheckEx
  162. fffff800`dcbc2130 fffff800`db16273a : 00000000`00000001 00000000`00000000 00000000`00000000 fffff800`db79c58f : nt!KiBugCheckDispatch+0x69
  163. fffff800`dcbc2270 fffff800`7864475a : 00000000`00000000 00000000`00000000 00000000`00000000 fffff800`dcbc2480 : nt!KiPageFault+0x23a
  164. fffff800`dcbc2400 fffff800`7864567d : 00000000`00000000 00000000`00000000 ffffe001`f76d4000 ffffe001`f7969240 : dxgmms1!VidSchiProcessDpcVSyncCookie+0x37a
  165. fffff800`dcbc25e0 fffff800`784b6bba : ffffe001`f5d0a1f0 ffffe001`f2ee9d00 ffffe001`f7848500 ffffe001`f6684000 : dxgmms1!VidSchDdiNotifyDpc+0x13d
  166. fffff800`dcbc2630 fffff800`793338d4 : ffffe001`f2eb8000 fffff800`79391d65 fffff800`dcbc2b20 ffffe001`f2f012c0 : dxgkrnl+0x8bba
  167. fffff800`dcbc2660 ffffe001`f2eb8000 : fffff800`79391d65 fffff800`dcbc2b20 ffffe001`f2f012c0 ffffe001`f2ecb000 : atikmdag+0x368d4
  168. fffff800`dcbc2668 fffff800`79391d65 : fffff800`dcbc2b20 ffffe001`f2f012c0 ffffe001`f2ecb000 fffff800`7939341b : 0xffffe001`f2eb8000
  169. fffff800`dcbc2670 fffff800`dcbc2b20 : ffffe001`f2f012c0 ffffe001`f2ecb000 fffff800`7939341b ffffe001`f78484f0 : atikmdag+0x94d65
  170. fffff800`dcbc2678 ffffe001`f2f012c0 : ffffe001`f2ecb000 fffff800`7939341b ffffe001`f78484f0 ffffe001`f2ee9d00 : 0xfffff800`dcbc2b20
  171. fffff800`dcbc2680 ffffe001`f2ecb000 : fffff800`7939341b ffffe001`f78484f0 ffffe001`f2ee9d00 fffff800`dcbc2740 : 0xffffe001`f2f012c0
  172. fffff800`dcbc2688 fffff800`7939341b : ffffe001`f78484f0 ffffe001`f2ee9d00 fffff800`dcbc2740 00000000`00000058 : 0xffffe001`f2ecb000
  173. fffff800`dcbc2690 ffffe001`f78484f0 : ffffe001`f2ee9d00 fffff800`dcbc2740 00000000`00000058 ffffe001`f2ecb000 : atikmdag+0x9641b
  174. fffff800`dcbc2698 ffffe001`f2ee9d00 : fffff800`dcbc2740 00000000`00000058 ffffe001`f2ecb000 fffff800`79395bbf : 0xffffe001`f78484f0
  175. fffff800`dcbc26a0 fffff800`dcbc2740 : 00000000`00000058 ffffe001`f2ecb000 fffff800`79395bbf ffffe001`f7853610 : 0xffffe001`f2ee9d00
  176. fffff800`dcbc26a8 00000000`00000058 : ffffe001`f2ecb000 fffff800`79395bbf ffffe001`f7853610 ffffe001`f78484f0 : 0xfffff800`dcbc2740
  177. fffff800`dcbc26b0 ffffe001`f2ecb000 : fffff800`79395bbf ffffe001`f7853610 ffffe001`f78484f0 ffffe001`f78484f0 : 0x58
  178. fffff800`dcbc26b8 fffff800`79395bbf : ffffe001`f7853610 ffffe001`f78484f0 ffffe001`f78484f0 ffffe001`f2ecb000 : 0xffffe001`f2ecb000
  179. fffff800`dcbc26c0 ffffe001`f7853610 : ffffe001`f78484f0 ffffe001`f78484f0 ffffe001`f2ecb000 00000000`00000000 : atikmdag+0x98bbf
  180. fffff800`dcbc26c8 ffffe001`f78484f0 : ffffe001`f78484f0 ffffe001`f2ecb000 00000000`00000000 ffffe001`f7853630 : 0xffffe001`f7853610
  181. fffff800`dcbc26d0 ffffe001`f78484f0 : ffffe001`f2ecb000 00000000`00000000 ffffe001`f7853630 00000000`00000000 : 0xffffe001`f78484f0
  182. fffff800`dcbc26d8 ffffe001`f2ecb000 : 00000000`00000000 ffffe001`f7853630 00000000`00000000 00000000`00000000 : 0xffffe001`f78484f0
  183. fffff800`dcbc26e0 00000000`00000000 : ffffe001`f7853630 00000000`00000000 00000000`00000000 00000000`00000000 : 0xffffe001`f2ecb000
  184.  
  185.  
  186. STACK_COMMAND: kb
  187.  
  188. THREAD_SHA1_HASH_MOD_FUNC: 04440e8b6a4bc7a9f9d1448e3b9dcd52942a934f
  189.  
  190. THREAD_SHA1_HASH_MOD_FUNC_OFFSET: 426fb110319a0d79a6ab07930c188504e34e45dd
  191.  
  192. THREAD_SHA1_HASH_MOD: f45ecf32f06881a49f299f0b228b913e329067b4
  193.  
  194. FOLLOWUP_IP:
  195. dxgmms1!VidSchiProcessDpcVSyncCookie+37a
  196. fffff800`7864475a f049ff4218 lock inc qword ptr [r10+18h]
  197.  
  198. FAULT_INSTR_CODE: 42ff49f0
  199.  
  200. SYMBOL_STACK_INDEX: 3
  201.  
  202. SYMBOL_NAME: dxgmms1!VidSchiProcessDpcVSyncCookie+37a
  203.  
  204. FOLLOWUP_NAME: MachineOwner
  205.  
  206. MODULE_NAME: dxgmms1
  207.  
  208. IMAGE_NAME: dxgmms1.sys
  209.  
  210. DEBUG_FLR_IMAGE_TIMESTAMP: 54505506
  211.  
  212. IMAGE_VERSION: 6.3.9600.17415
  213.  
  214. BUCKET_ID_FUNC_OFFSET: 37a
  215.  
  216. FAILURE_BUCKET_ID: AV_dxgmms1!VidSchiProcessDpcVSyncCookie
  217.  
  218. BUCKET_ID: AV_dxgmms1!VidSchiProcessDpcVSyncCookie
  219.  
  220. PRIMARY_PROBLEM_CLASS: AV_dxgmms1!VidSchiProcessDpcVSyncCookie
  221.  
  222. TARGET_TIME: 2016-11-18T13:01:04.000Z
  223.  
  224. OSBUILD: 9600
  225.  
  226. OSSERVICEPACK: 18505
  227.  
  228. SERVICEPACK_NUMBER: 0
  229.  
  230. OS_REVISION: 0
  231.  
  232. SUITE_MASK: 272
  233.  
  234. PRODUCT_TYPE: 1
  235.  
  236. OSPLATFORM_TYPE: x64
  237.  
  238. OSNAME: Windows 8.1
  239.  
  240. OSEDITION: Windows 8.1 WinNt TerminalServer SingleUserTS
  241.  
  242. OS_LOCALE:
  243.  
  244. USER_LCID: 0
  245.  
  246. OSBUILD_TIMESTAMP: 2016-09-30 10:31:28
  247.  
  248. BUILDDATESTAMP_STR: 160930-0600
  249.  
  250. BUILDLAB_STR: winblue_ltsb
  251.  
  252. BUILDOSVER_STR: 6.3.9600.18505
  253.  
  254. ANALYSIS_SESSION_ELAPSED_TIME: 5c0
  255.  
  256. ANALYSIS_SOURCE: KM
  257.  
  258. FAILURE_ID_HASH_STRING: km:av_dxgmms1!vidschiprocessdpcvsynccookie
  259.  
  260. FAILURE_ID_HASH: {1804077a-4f31-7390-769d-6ae6cc8d2e9c}
  261.  
  262. Followup: MachineOwner
  263. ---------
  264.  
  265. 0: kd> !analyze -v
  266. *******************************************************************************
  267. * *
  268. * Bugcheck Analysis *
  269. * *
  270. *******************************************************************************
  271.  
  272. DRIVER_IRQL_NOT_LESS_OR_EQUAL (d1)
  273. An attempt was made to access a pageable (or completely invalid) address at an
  274. interrupt request level (IRQL) that is too high. This is usually
  275. caused by drivers using improper addresses.
  276. If kernel debugger is available get stack backtrace.
  277. Arguments:
  278. Arg1: 0000000000000018, memory referenced
  279. Arg2: 0000000000000002, IRQL
  280. Arg3: 0000000000000001, value 0 = read operation, 1 = write operation
  281. Arg4: fffff8007864475a, address which referenced memory
  282.  
  283. Debugging Details:
  284. ------------------
  285.  
  286.  
  287. DUMP_CLASS: 1
  288.  
  289. DUMP_QUALIFIER: 400
  290.  
  291. BUILD_VERSION_STRING: 6.3.9600.18505 (winblue_ltsb.160930-0600)
  292.  
  293. SYSTEM_MANUFACTURER: ASUS
  294.  
  295. SYSTEM_PRODUCT_NAME: All Series
  296.  
  297. SYSTEM_SKU: All
  298.  
  299. SYSTEM_VERSION: System Version
  300.  
  301. BIOS_VENDOR: American Megatrends Inc.
  302.  
  303. BIOS_VERSION: 1207
  304.  
  305. BIOS_DATE: 07/01/2013
  306.  
  307. BASEBOARD_MANUFACTURER: ASUSTeK COMPUTER INC.
  308.  
  309. BASEBOARD_PRODUCT: Z87-A
  310.  
  311. BASEBOARD_VERSION: Rev 1.xx
  312.  
  313. DUMP_TYPE: 2
  314.  
  315. BUGCHECK_P1: 18
  316.  
  317. BUGCHECK_P2: 2
  318.  
  319. BUGCHECK_P3: 1
  320.  
  321. BUGCHECK_P4: fffff8007864475a
  322.  
  323. WRITE_ADDRESS: GetUlongPtrFromAddress: unable to read from fffff800db366298
  324. GetUlongPtrFromAddress: unable to read from fffff800db366520
  325. 0000000000000018
  326.  
  327. CURRENT_IRQL: 2
  328.  
  329. FAULTING_IP:
  330. dxgmms1!VidSchiProcessDpcVSyncCookie+37a
  331. fffff800`7864475a f049ff4218 lock inc qword ptr [r10+18h]
  332.  
  333. CPU_COUNT: 8
  334.  
  335. CPU_MHZ: db2
  336.  
  337. CPU_VENDOR: GenuineIntel
  338.  
  339. CPU_FAMILY: 6
  340.  
  341. CPU_MODEL: 3c
  342.  
  343. CPU_STEPPING: 3
  344.  
  345. CPU_MICROCODE: 6,3c,3,0 (F,M,S,R) SIG: 1C'00000000 (cache) 1C'00000000 (init)
  346.  
  347. CUSTOMER_CRASH_COUNT: 1
  348.  
  349. DEFAULT_BUCKET_ID: WIN8_DRIVER_FAULT
  350.  
  351. BUGCHECK_STR: AV
  352.  
  353. PROCESS_NAME: System
  354.  
  355. ANALYSIS_SESSION_HOST: CORE-SERVICES
  356.  
  357. ANALYSIS_SESSION_TIME: 11-18-2016 12:58:55.0354
  358.  
  359. ANALYSIS_VERSION: 10.0.14321.1024 x86fre
  360.  
  361. TRAP_FRAME: fffff800dcbc2270 -- (.trap 0xfffff800dcbc2270)
  362. NOTE: The trap frame does not contain all registers.
  363. Some register values may be zeroed or incorrect.
  364. rax=00000000fffffffe rbx=0000000000000000 rcx=0000000000000000
  365. rdx=0000000000000001 rsi=0000000000000000 rdi=0000000000000000
  366. rip=fffff8007864475a rsp=fffff800dcbc2400 rbp=fffff800dcbc2480
  367. r8=ffffe001f9ed2b00 r9=ffffe001f33ba110 r10=0000000000000000
  368. r11=0000000000000000 r12=0000000000000000 r13=0000000000000000
  369. r14=0000000000000000 r15=0000000000000000
  370. iopl=0 nv up ei pl zr na po nc
  371. dxgmms1!VidSchiProcessDpcVSyncCookie+0x37a:
  372. fffff800`7864475a f049ff4218 lock inc qword ptr [r10+18h] ds:00000000`00000018=????????????????
  373. Resetting default scope
  374.  
  375. LAST_CONTROL_TRANSFER: from fffff800db163ee9 to fffff800db1583a0
  376.  
  377. STACK_TEXT:
  378. fffff800`dcbc2128 fffff800`db163ee9 : 00000000`0000000a 00000000`00000018 00000000`00000002 00000000`00000001 : nt!KeBugCheckEx
  379. fffff800`dcbc2130 fffff800`db16273a : 00000000`00000001 00000000`00000000 00000000`00000000 fffff800`db79c58f : nt!KiBugCheckDispatch+0x69
  380. fffff800`dcbc2270 fffff800`7864475a : 00000000`00000000 00000000`00000000 00000000`00000000 fffff800`dcbc2480 : nt!KiPageFault+0x23a
  381. fffff800`dcbc2400 fffff800`7864567d : 00000000`00000000 00000000`00000000 ffffe001`f76d4000 ffffe001`f7969240 : dxgmms1!VidSchiProcessDpcVSyncCookie+0x37a
  382. fffff800`dcbc25e0 fffff800`784b6bba : ffffe001`f5d0a1f0 ffffe001`f2ee9d00 ffffe001`f7848500 ffffe001`f6684000 : dxgmms1!VidSchDdiNotifyDpc+0x13d
  383. fffff800`dcbc2630 fffff800`793338d4 : ffffe001`f2eb8000 fffff800`79391d65 fffff800`dcbc2b20 ffffe001`f2f012c0 : dxgkrnl+0x8bba
  384. fffff800`dcbc2660 ffffe001`f2eb8000 : fffff800`79391d65 fffff800`dcbc2b20 ffffe001`f2f012c0 ffffe001`f2ecb000 : atikmdag+0x368d4
  385. fffff800`dcbc2668 fffff800`79391d65 : fffff800`dcbc2b20 ffffe001`f2f012c0 ffffe001`f2ecb000 fffff800`7939341b : 0xffffe001`f2eb8000
  386. fffff800`dcbc2670 fffff800`dcbc2b20 : ffffe001`f2f012c0 ffffe001`f2ecb000 fffff800`7939341b ffffe001`f78484f0 : atikmdag+0x94d65
  387. fffff800`dcbc2678 ffffe001`f2f012c0 : ffffe001`f2ecb000 fffff800`7939341b ffffe001`f78484f0 ffffe001`f2ee9d00 : 0xfffff800`dcbc2b20
  388. fffff800`dcbc2680 ffffe001`f2ecb000 : fffff800`7939341b ffffe001`f78484f0 ffffe001`f2ee9d00 fffff800`dcbc2740 : 0xffffe001`f2f012c0
  389. fffff800`dcbc2688 fffff800`7939341b : ffffe001`f78484f0 ffffe001`f2ee9d00 fffff800`dcbc2740 00000000`00000058 : 0xffffe001`f2ecb000
  390. fffff800`dcbc2690 ffffe001`f78484f0 : ffffe001`f2ee9d00 fffff800`dcbc2740 00000000`00000058 ffffe001`f2ecb000 : atikmdag+0x9641b
  391. fffff800`dcbc2698 ffffe001`f2ee9d00 : fffff800`dcbc2740 00000000`00000058 ffffe001`f2ecb000 fffff800`79395bbf : 0xffffe001`f78484f0
  392. fffff800`dcbc26a0 fffff800`dcbc2740 : 00000000`00000058 ffffe001`f2ecb000 fffff800`79395bbf ffffe001`f7853610 : 0xffffe001`f2ee9d00
  393. fffff800`dcbc26a8 00000000`00000058 : ffffe001`f2ecb000 fffff800`79395bbf ffffe001`f7853610 ffffe001`f78484f0 : 0xfffff800`dcbc2740
  394. fffff800`dcbc26b0 ffffe001`f2ecb000 : fffff800`79395bbf ffffe001`f7853610 ffffe001`f78484f0 ffffe001`f78484f0 : 0x58
  395. fffff800`dcbc26b8 fffff800`79395bbf : ffffe001`f7853610 ffffe001`f78484f0 ffffe001`f78484f0 ffffe001`f2ecb000 : 0xffffe001`f2ecb000
  396. fffff800`dcbc26c0 ffffe001`f7853610 : ffffe001`f78484f0 ffffe001`f78484f0 ffffe001`f2ecb000 00000000`00000000 : atikmdag+0x98bbf
  397. fffff800`dcbc26c8 ffffe001`f78484f0 : ffffe001`f78484f0 ffffe001`f2ecb000 00000000`00000000 ffffe001`f7853630 : 0xffffe001`f7853610
  398. fffff800`dcbc26d0 ffffe001`f78484f0 : ffffe001`f2ecb000 00000000`00000000 ffffe001`f7853630 00000000`00000000 : 0xffffe001`f78484f0
  399. fffff800`dcbc26d8 ffffe001`f2ecb000 : 00000000`00000000 ffffe001`f7853630 00000000`00000000 00000000`00000000 : 0xffffe001`f78484f0
  400. fffff800`dcbc26e0 00000000`00000000 : ffffe001`f7853630 00000000`00000000 00000000`00000000 00000000`00000000 : 0xffffe001`f2ecb000
  401.  
  402.  
  403. STACK_COMMAND: kb
  404.  
  405. THREAD_SHA1_HASH_MOD_FUNC: 04440e8b6a4bc7a9f9d1448e3b9dcd52942a934f
  406.  
  407. THREAD_SHA1_HASH_MOD_FUNC_OFFSET: 426fb110319a0d79a6ab07930c188504e34e45dd
  408.  
  409. THREAD_SHA1_HASH_MOD: f45ecf32f06881a49f299f0b228b913e329067b4
  410.  
  411. FOLLOWUP_IP:
  412. dxgmms1!VidSchiProcessDpcVSyncCookie+37a
  413. fffff800`7864475a f049ff4218 lock inc qword ptr [r10+18h]
  414.  
  415. FAULT_INSTR_CODE: 42ff49f0
  416.  
  417. SYMBOL_STACK_INDEX: 3
  418.  
  419. SYMBOL_NAME: dxgmms1!VidSchiProcessDpcVSyncCookie+37a
  420.  
  421. FOLLOWUP_NAME: MachineOwner
  422.  
  423. MODULE_NAME: dxgmms1
  424.  
  425. IMAGE_NAME: dxgmms1.sys
  426.  
  427. DEBUG_FLR_IMAGE_TIMESTAMP: 54505506
  428.  
  429. IMAGE_VERSION: 6.3.9600.17415
  430.  
  431. BUCKET_ID_FUNC_OFFSET: 37a
  432.  
  433. FAILURE_BUCKET_ID: AV_dxgmms1!VidSchiProcessDpcVSyncCookie
  434.  
  435. BUCKET_ID: AV_dxgmms1!VidSchiProcessDpcVSyncCookie
  436.  
  437. PRIMARY_PROBLEM_CLASS: AV_dxgmms1!VidSchiProcessDpcVSyncCookie
  438.  
  439. TARGET_TIME: 2016-11-18T13:01:04.000Z
  440.  
  441. OSBUILD: 9600
  442.  
  443. OSSERVICEPACK: 18505
  444.  
  445. SERVICEPACK_NUMBER: 0
  446.  
  447. OS_REVISION: 0
  448.  
  449. SUITE_MASK: 272
  450.  
  451. PRODUCT_TYPE: 1
  452.  
  453. OSPLATFORM_TYPE: x64
  454.  
  455. OSNAME: Windows 8.1
  456.  
  457. OSEDITION: Windows 8.1 WinNt TerminalServer SingleUserTS
  458.  
  459. OS_LOCALE:
  460.  
  461. USER_LCID: 0
  462.  
  463. OSBUILD_TIMESTAMP: 2016-09-30 10:31:28
  464.  
  465. BUILDDATESTAMP_STR: 160930-0600
  466.  
  467. BUILDLAB_STR: winblue_ltsb
  468.  
  469. BUILDOSVER_STR: 6.3.9600.18505
  470.  
  471. ANALYSIS_SESSION_ELAPSED_TIME: 5c4
  472.  
  473. ANALYSIS_SOURCE: KM
  474.  
  475. FAILURE_ID_HASH_STRING: km:av_dxgmms1!vidschiprocessdpcvsynccookie
  476.  
  477. FAILURE_ID_HASH: {1804077a-4f31-7390-769d-6ae6cc8d2e9c}
  478.  
  479. Followup: MachineOwner
  480. ---------
  481.  
  482. 0: kd> !analyze -v
  483. *******************************************************************************
  484. * *
  485. * Bugcheck Analysis *
  486. * *
  487. *******************************************************************************
  488.  
  489. DRIVER_IRQL_NOT_LESS_OR_EQUAL (d1)
  490. An attempt was made to access a pageable (or completely invalid) address at an
  491. interrupt request level (IRQL) that is too high. This is usually
  492. caused by drivers using improper addresses.
  493. If kernel debugger is available get stack backtrace.
  494. Arguments:
  495. Arg1: 0000000000000018, memory referenced
  496. Arg2: 0000000000000002, IRQL
  497. Arg3: 0000000000000001, value 0 = read operation, 1 = write operation
  498. Arg4: fffff8007864475a, address which referenced memory
  499.  
  500. Debugging Details:
  501. ------------------
  502.  
  503.  
  504. DUMP_CLASS: 1
  505.  
  506. DUMP_QUALIFIER: 400
  507.  
  508. BUILD_VERSION_STRING: 6.3.9600.18505 (winblue_ltsb.160930-0600)
  509.  
  510. SYSTEM_MANUFACTURER: ASUS
  511.  
  512. SYSTEM_PRODUCT_NAME: All Series
  513.  
  514. SYSTEM_SKU: All
  515.  
  516. SYSTEM_VERSION: System Version
  517.  
  518. BIOS_VENDOR: American Megatrends Inc.
  519.  
  520. BIOS_VERSION: 1207
  521.  
  522. BIOS_DATE: 07/01/2013
  523.  
  524. BASEBOARD_MANUFACTURER: ASUSTeK COMPUTER INC.
  525.  
  526. BASEBOARD_PRODUCT: Z87-A
  527.  
  528. BASEBOARD_VERSION: Rev 1.xx
  529.  
  530. DUMP_TYPE: 2
  531.  
  532. BUGCHECK_P1: 18
  533.  
  534. BUGCHECK_P2: 2
  535.  
  536. BUGCHECK_P3: 1
  537.  
  538. BUGCHECK_P4: fffff8007864475a
  539.  
  540. WRITE_ADDRESS: GetUlongPtrFromAddress: unable to read from fffff800db366298
  541. GetUlongPtrFromAddress: unable to read from fffff800db366520
  542. 0000000000000018
  543.  
  544. CURRENT_IRQL: 2
  545.  
  546. FAULTING_IP:
  547. dxgmms1!VidSchiProcessDpcVSyncCookie+37a
  548. fffff800`7864475a f049ff4218 lock inc qword ptr [r10+18h]
  549.  
  550. CPU_COUNT: 8
  551.  
  552. CPU_MHZ: db2
  553.  
  554. CPU_VENDOR: GenuineIntel
  555.  
  556. CPU_FAMILY: 6
  557.  
  558. CPU_MODEL: 3c
  559.  
  560. CPU_STEPPING: 3
  561.  
  562. CPU_MICROCODE: 6,3c,3,0 (F,M,S,R) SIG: 1C'00000000 (cache) 1C'00000000 (init)
  563.  
  564. CUSTOMER_CRASH_COUNT: 1
  565.  
  566. DEFAULT_BUCKET_ID: WIN8_DRIVER_FAULT
  567.  
  568. BUGCHECK_STR: AV
  569.  
  570. PROCESS_NAME: System
  571.  
  572. ANALYSIS_SESSION_HOST: CORE-SERVICES
  573.  
  574. ANALYSIS_SESSION_TIME: 11-18-2016 12:58:56.0995
  575.  
  576. ANALYSIS_VERSION: 10.0.14321.1024 x86fre
  577.  
  578. TRAP_FRAME: fffff800dcbc2270 -- (.trap 0xfffff800dcbc2270)
  579. NOTE: The trap frame does not contain all registers.
  580. Some register values may be zeroed or incorrect.
  581. rax=00000000fffffffe rbx=0000000000000000 rcx=0000000000000000
  582. rdx=0000000000000001 rsi=0000000000000000 rdi=0000000000000000
  583. rip=fffff8007864475a rsp=fffff800dcbc2400 rbp=fffff800dcbc2480
  584. r8=ffffe001f9ed2b00 r9=ffffe001f33ba110 r10=0000000000000000
  585. r11=0000000000000000 r12=0000000000000000 r13=0000000000000000
  586. r14=0000000000000000 r15=0000000000000000
  587. iopl=0 nv up ei pl zr na po nc
  588. dxgmms1!VidSchiProcessDpcVSyncCookie+0x37a:
  589. fffff800`7864475a f049ff4218 lock inc qword ptr [r10+18h] ds:00000000`00000018=????????????????
  590. Resetting default scope
  591.  
  592. LAST_CONTROL_TRANSFER: from fffff800db163ee9 to fffff800db1583a0
  593.  
  594. STACK_TEXT:
  595. fffff800`dcbc2128 fffff800`db163ee9 : 00000000`0000000a 00000000`00000018 00000000`00000002 00000000`00000001 : nt!KeBugCheckEx
  596. fffff800`dcbc2130 fffff800`db16273a : 00000000`00000001 00000000`00000000 00000000`00000000 fffff800`db79c58f : nt!KiBugCheckDispatch+0x69
  597. fffff800`dcbc2270 fffff800`7864475a : 00000000`00000000 00000000`00000000 00000000`00000000 fffff800`dcbc2480 : nt!KiPageFault+0x23a
  598. fffff800`dcbc2400 fffff800`7864567d : 00000000`00000000 00000000`00000000 ffffe001`f76d4000 ffffe001`f7969240 : dxgmms1!VidSchiProcessDpcVSyncCookie+0x37a
  599. fffff800`dcbc25e0 fffff800`784b6bba : ffffe001`f5d0a1f0 ffffe001`f2ee9d00 ffffe001`f7848500 ffffe001`f6684000 : dxgmms1!VidSchDdiNotifyDpc+0x13d
  600. fffff800`dcbc2630 fffff800`793338d4 : ffffe001`f2eb8000 fffff800`79391d65 fffff800`dcbc2b20 ffffe001`f2f012c0 : dxgkrnl+0x8bba
  601. fffff800`dcbc2660 ffffe001`f2eb8000 : fffff800`79391d65 fffff800`dcbc2b20 ffffe001`f2f012c0 ffffe001`f2ecb000 : atikmdag+0x368d4
  602. fffff800`dcbc2668 fffff800`79391d65 : fffff800`dcbc2b20 ffffe001`f2f012c0 ffffe001`f2ecb000 fffff800`7939341b : 0xffffe001`f2eb8000
  603. fffff800`dcbc2670 fffff800`dcbc2b20 : ffffe001`f2f012c0 ffffe001`f2ecb000 fffff800`7939341b ffffe001`f78484f0 : atikmdag+0x94d65
  604. fffff800`dcbc2678 ffffe001`f2f012c0 : ffffe001`f2ecb000 fffff800`7939341b ffffe001`f78484f0 ffffe001`f2ee9d00 : 0xfffff800`dcbc2b20
  605. fffff800`dcbc2680 ffffe001`f2ecb000 : fffff800`7939341b ffffe001`f78484f0 ffffe001`f2ee9d00 fffff800`dcbc2740 : 0xffffe001`f2f012c0
  606. fffff800`dcbc2688 fffff800`7939341b : ffffe001`f78484f0 ffffe001`f2ee9d00 fffff800`dcbc2740 00000000`00000058 : 0xffffe001`f2ecb000
  607. fffff800`dcbc2690 ffffe001`f78484f0 : ffffe001`f2ee9d00 fffff800`dcbc2740 00000000`00000058 ffffe001`f2ecb000 : atikmdag+0x9641b
  608. fffff800`dcbc2698 ffffe001`f2ee9d00 : fffff800`dcbc2740 00000000`00000058 ffffe001`f2ecb000 fffff800`79395bbf : 0xffffe001`f78484f0
  609. fffff800`dcbc26a0 fffff800`dcbc2740 : 00000000`00000058 ffffe001`f2ecb000 fffff800`79395bbf ffffe001`f7853610 : 0xffffe001`f2ee9d00
  610. fffff800`dcbc26a8 00000000`00000058 : ffffe001`f2ecb000 fffff800`79395bbf ffffe001`f7853610 ffffe001`f78484f0 : 0xfffff800`dcbc2740
  611. fffff800`dcbc26b0 ffffe001`f2ecb000 : fffff800`79395bbf ffffe001`f7853610 ffffe001`f78484f0 ffffe001`f78484f0 : 0x58
  612. fffff800`dcbc26b8 fffff800`79395bbf : ffffe001`f7853610 ffffe001`f78484f0 ffffe001`f78484f0 ffffe001`f2ecb000 : 0xffffe001`f2ecb000
  613. fffff800`dcbc26c0 ffffe001`f7853610 : ffffe001`f78484f0 ffffe001`f78484f0 ffffe001`f2ecb000 00000000`00000000 : atikmdag+0x98bbf
  614. fffff800`dcbc26c8 ffffe001`f78484f0 : ffffe001`f78484f0 ffffe001`f2ecb000 00000000`00000000 ffffe001`f7853630 : 0xffffe001`f7853610
  615. fffff800`dcbc26d0 ffffe001`f78484f0 : ffffe001`f2ecb000 00000000`00000000 ffffe001`f7853630 00000000`00000000 : 0xffffe001`f78484f0
  616. fffff800`dcbc26d8 ffffe001`f2ecb000 : 00000000`00000000 ffffe001`f7853630 00000000`00000000 00000000`00000000 : 0xffffe001`f78484f0
  617. fffff800`dcbc26e0 00000000`00000000 : ffffe001`f7853630 00000000`00000000 00000000`00000000 00000000`00000000 : 0xffffe001`f2ecb000
  618.  
  619.  
  620. STACK_COMMAND: kb
  621.  
  622. THREAD_SHA1_HASH_MOD_FUNC: 04440e8b6a4bc7a9f9d1448e3b9dcd52942a934f
  623.  
  624. THREAD_SHA1_HASH_MOD_FUNC_OFFSET: 426fb110319a0d79a6ab07930c188504e34e45dd
  625.  
  626. THREAD_SHA1_HASH_MOD: f45ecf32f06881a49f299f0b228b913e329067b4
  627.  
  628. FOLLOWUP_IP:
  629. dxgmms1!VidSchiProcessDpcVSyncCookie+37a
  630. fffff800`7864475a f049ff4218 lock inc qword ptr [r10+18h]
  631.  
  632. FAULT_INSTR_CODE: 42ff49f0
  633.  
  634. SYMBOL_STACK_INDEX: 3
  635.  
  636. SYMBOL_NAME: dxgmms1!VidSchiProcessDpcVSyncCookie+37a
  637.  
  638. FOLLOWUP_NAME: MachineOwner
  639.  
  640. MODULE_NAME: dxgmms1
  641.  
  642. IMAGE_NAME: dxgmms1.sys
  643.  
  644. DEBUG_FLR_IMAGE_TIMESTAMP: 54505506
  645.  
  646. IMAGE_VERSION: 6.3.9600.17415
  647.  
  648. BUCKET_ID_FUNC_OFFSET: 37a
  649.  
  650. FAILURE_BUCKET_ID: AV_dxgmms1!VidSchiProcessDpcVSyncCookie
  651.  
  652. BUCKET_ID: AV_dxgmms1!VidSchiProcessDpcVSyncCookie
  653.  
  654. PRIMARY_PROBLEM_CLASS: AV_dxgmms1!VidSchiProcessDpcVSyncCookie
  655.  
  656. TARGET_TIME: 2016-11-18T13:01:04.000Z
  657.  
  658. OSBUILD: 9600
  659.  
  660. OSSERVICEPACK: 18505
  661.  
  662. SERVICEPACK_NUMBER: 0
  663.  
  664. OS_REVISION: 0
  665.  
  666. SUITE_MASK: 272
  667.  
  668. PRODUCT_TYPE: 1
  669.  
  670. OSPLATFORM_TYPE: x64
  671.  
  672. OSNAME: Windows 8.1
  673.  
  674. OSEDITION: Windows 8.1 WinNt TerminalServer SingleUserTS
  675.  
  676. OS_LOCALE:
  677.  
  678. USER_LCID: 0
  679.  
  680. OSBUILD_TIMESTAMP: 2016-09-30 10:31:28
  681.  
  682. BUILDDATESTAMP_STR: 160930-0600
  683.  
  684. BUILDLAB_STR: winblue_ltsb
  685.  
  686. BUILDOSVER_STR: 6.3.9600.18505
  687.  
  688. ANALYSIS_SESSION_ELAPSED_TIME: 5c0
  689.  
  690. ANALYSIS_SOURCE: KM
  691.  
  692. FAILURE_ID_HASH_STRING: km:av_dxgmms1!vidschiprocessdpcvsynccookie
  693.  
  694. FAILURE_ID_HASH: {1804077a-4f31-7390-769d-6ae6cc8d2e9c}
  695.  
  696. Followup: MachineOwner
  697. ---------
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement