*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
Use !analyze -v to get detailed debugging information.
BugCheck 1E, {0, 0, 0, 0}
*** WARNING: Unable to verify timestamp for atikmdag.sys
*** ERROR: Module load completed but symbols could not be loaded for atikmdag.sys
Probably caused by : dxgmms1.sys ( dxgmms1!VidSchiSignalFlipEvents+be )
Followup: MachineOwner
---------
3: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
KMODE_EXCEPTION_NOT_HANDLED (1e)
This is a very common bugcheck. Usually the exception address pinpoints
the driver/function that caused the problem. Always note this address
as well as the link date of the driver/image that contains this address.
Arguments:
Arg1: 0000000000000000, The exception code that was not handled
Arg2: 0000000000000000, The address that the exception occurred at
Arg3: 0000000000000000, Parameter 0 of the exception
Arg4: 0000000000000000, Parameter 1 of the exception
Debugging Details:
------------------
EXCEPTION_CODE: (Win32) 0 (0) - The operation completed successfully.
FAULTING_IP:
+3039623165666439
00000000`00000000 ?? ???
EXCEPTION_PARAMETER1: 0000000000000000
EXCEPTION_PARAMETER2: 0000000000000000
ERROR_CODE: (NTSTATUS) 0 - STATUS_WAIT_0
BUGCHECK_STR: 0x1E_0
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT
PROCESS_NAME: System
CURRENT_IRQL: 2
EXCEPTION_RECORD: fffff88002ffd4f8 -- (.exr 0xfffff88002ffd4f8)
ExceptionAddress: fffff800030e2e7e (nt!KeSetEvent+0x00000000000002ec)
ExceptionCode: c0000005 (Access violation)
ExceptionFlags: 00000000
NumberParameters: 2
Parameter[0]: 0000000000000000
Parameter[1]: ffffffffffffffff
Attempt to read from address ffffffffffffffff
TRAP_FRAME: fffff88002ffd5a0 -- (.trap 0xfffff88002ffd5a0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=fffffa8007f6a9b8 rbx=0000000000000000 rcx=f7fffa8007f6a9b8
rdx=fffffa8008964c68 rsi=0000000000000000 rdi=0000000000000000
rip=fffff800030e2e7e rsp=fffff88002ffd730 rbp=0000000000000002
r8=fffffa8008964c68 r9=fffffa8007f6a9b0 r10=fffff80003062000
r11=0000000000000002 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei pl zr na po nc
nt!KeSetEvent+0x2ec:
fffff800`030e2e7e 48894108 mov qword ptr [rcx+8],rax ds:5180:f7fffa80`07f6a9c0=????????????????
Resetting default scope
LAST_CONTROL_TRANSFER: from fffff800030d65fe to fffff800030dec10
STACK_TEXT:
fffff880`02ffc5d8 fffff800`030d65fe : 00000000`00000000 fffff880`014da5d5 fffff880`02ffcd50 fffff800`0310a830 : nt!KeBugCheck
fffff880`02ffc5e0 fffff800`0310a4fd : fffff800`032e871c fffff800`03225c30 fffff800`03062000 fffff880`02ffd4f8 : nt!KiKernelCalloutExceptionHandler+0xe
fffff880`02ffc610 fffff800`031092d5 : fffff800`032290fc fffff880`02ffc688 fffff880`02ffd4f8 fffff800`03062000 : nt!RtlpExecuteHandlerForException+0xd
fffff880`02ffc640 fffff800`0311a361 : fffff880`02ffd4f8 fffff880`02ffcd50 fffff880`00000000 fffff880`00000004 : nt!RtlDispatchException+0x415
fffff880`02ffcd20 fffff800`030de2c2 : fffff880`02ffd4f8 00000000`00000000 fffff880`02ffd5a0 00000000`00000000 : nt!KiDispatchException+0x135
fffff880`02ffd3c0 fffff800`030dcbca : 000000f8`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiExceptionDispatch+0xc2
fffff880`02ffd5a0 fffff800`030e2e7e : 00000000`00000002 00000000`00000001 00000000`00000000 00000000`00000001 : nt!KiGeneralProtectionFault+0x10a
fffff880`02ffd730 fffff880`05370202 : fffffa80`00000000 fffffa80`00000000 fffffa80`07f6a400 fffffa80`08964c68 : nt!KeSetEvent+0x2ec
fffff880`02ffd7a0 fffff880`0536c27f : fffffa80`07f6a410 fffffa80`06d21af0 fffffa80`06d21af0 00000000`0001a3c4 : dxgmms1!VidSchiSignalFlipEvents+0xbe
fffff880`02ffd7d0 fffff880`0536bce8 : 00000000`00000000 fffff880`0000001d fffff880`00000001 0006b512`0006b511 : dxgmms1!VidSchiProcessDpcVSyncCookie+0x427
fffff880`02ffd890 fffff880`0536bc4c : fffffa80`07d89ef0 fffffa80`07f6a410 fffffa80`07fd9480 fffffa80`07d909b0 : dxgmms1!VidSchDdiNotifyDpcWorker+0x80
fffff880`02ffd8e0 fffff880`052721cf : fffffa80`07fd9480 fffffa80`07d99bd0 fffff880`0490a634 00000000`00000000 : dxgmms1!VidSchDdiNotifyDpc+0x94
fffff880`02ffd930 fffff880`0485623b : 00000000`00000001 fffffa80`07d87000 fffffa80`07d89ef0 fffffa80`07d909b0 : dxgkrnl!DxgNotifyDpcCB+0x77
fffff880`02ffd960 00000000`00000001 : fffffa80`07d87000 fffffa80`07d89ef0 fffffa80`07d909b0 fffffa80`07d89000 : atikmdag+0x4d23b
fffff880`02ffd968 fffffa80`07d87000 : fffffa80`07d89ef0 fffffa80`07d909b0 fffffa80`07d89000 fffff880`0486b070 : 0x1
fffff880`02ffd970 fffffa80`07d89ef0 : fffffa80`07d909b0 fffffa80`07d89000 fffff880`0486b070 00000000`00000000 : 0xfffffa80`07d87000
fffff880`02ffd978 fffffa80`07d909b0 : fffffa80`07d89000 fffff880`0486b070 00000000`00000000 0bb09599`00000000 : 0xfffffa80`07d89ef0
fffff880`02ffd980 fffffa80`07d89000 : fffff880`0486b070 00000000`00000000 0bb09599`00000000 00000013`00000002 : 0xfffffa80`07d909b0
fffff880`02ffd988 fffff880`0486b070 : 00000000`00000000 0bb09599`00000000 00000013`00000002 00000000`00000004 : 0xfffffa80`07d89000
fffff880`02ffd990 00000000`00000000 : 0bb09599`00000000 00000013`00000002 00000000`00000004 00000000`00000000 : atikmdag+0x62070
STACK_COMMAND: kb
FOLLOWUP_IP:
dxgmms1!VidSchiSignalFlipEvents+be
fffff880`05370202 488b5c2430 mov rbx,qword ptr [rsp+30h]
SYMBOL_STACK_INDEX: 8
SYMBOL_NAME: dxgmms1!VidSchiSignalFlipEvents+be
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: dxgmms1
IMAGE_NAME: dxgmms1.sys
DEBUG_FLR_IMAGE_TIMESTAMP: 4ce799c1
FAILURE_BUCKET_ID: X64_0x1E_0_dxgmms1!VidSchiSignalFlipEvents+be
BUCKET_ID: X64_0x1E_0_dxgmms1!VidSchiSignalFlipEvents+be