Ever since upgrading my AMD 6950 to an AMD 7970 card, I've been having two very annoying issues: 1) a BSOD with atikmdag.sys randomly, but most often within a few mins of resuming from monitor sleep 2) Monitor just not waking up from sleep at all.
This is happening daily, and is driving me nuts. Here are the results from analyzing the crash dump in the hopes that you guys can help:
thanks,
Microsoft (R) Windows Debugger Version 6.2.9200.16384 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [C:\Windows\MEMORY.DMP]
Kernel Bitmap Dump File: Only kernel address space is available
Symbol search path is: SRV*D:\symbols*http://msdl.microsoft.com/download/symbols
Executable search path is:
Windows 8 Kernel Version 9200 MP (8 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS
Built by: 9200.16551.amd64fre.win8_gdr.130306-1502
Machine Name:
Kernel base = 0xfffff800`32804000 PsLoadedModuleList = 0xfffff800`32ad0b00
Debug session time: Thu May 2 11:23:14.415 2013 (UTC - 4:00)
System Uptime: 0 days 0:10:21.057
Loading Kernel Symbols
...............................................................
................................................................
..................................
Loading User Symbols
PEB is paged out (Peb.Ldr = 000007f6`03edf018). Type ".hh dbgerr001" for details
Loading unloaded module list
..........
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
Use !analyze -v to get detailed debugging information.
BugCheck 3B, {c0000005, fffff880051aad95, fffff8801a49f0b0, 0}
*** ERROR: Module load completed but symbols could not be loaded for atikmdag.sys
*** ERROR: Module load completed but symbols could not be loaded for atikmpag.sys
Probably caused by : atikmdag.sys ( atikmdag+14bd95 )
Followup: MachineOwner
---------
2: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
SYSTEM_SERVICE_EXCEPTION (3b)
An exception happened while executing a system service routine.
Arguments:
Arg1: 00000000c0000005, Exception code that caused the bugcheck
Arg2: fffff880051aad95, Address of the instruction which caused the bugcheck
Arg3: fffff8801a49f0b0, Address of the context record for the exception that caused the bugcheck
Arg4: 0000000000000000, zero.
Debugging Details:
------------------
EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - The instruction at 0x%08lx referenced memory at 0x%08lx. The memory could not be %s.
FAULTING_IP:
atikmdag+14bd95
fffff880`051aad95 8b4108 mov eax,dword ptr [rcx+8]
CONTEXT: fffff8801a49f0b0 -- (.cxr 0xfffff8801a49f0b0)
rax=0000000600000003 rbx=0000000600000003 rcx=0000000600000003
rdx=0000000000000010 rsi=fffffa800da2e5c0 rdi=fffffa8012a47040
rip=fffff880051aad95 rsp=fffff8801a49fab0 rbp=fffff8801a49fab0
r8=0000000000000015 r9=0000000000000000 r10=0000000000000801
r11=fffff8801a4a03f0 r12=0000000040001fc0 r13=fffff8a00f32c200
r14=fffffa8012a47040 r15=0000000000000000
iopl=0 nv up ei pl nz na po nc
cs=0010 ss=0018 ds=002b es=002b fs=0053 gs=002b efl=00010206
atikmdag+0x14bd95:
fffff880`051aad95 8b4108 mov eax,dword ptr [rcx+8] ds:002b:00000006`0000000b=????????
Resetting default scope
DEFAULT_BUCKET_ID: WIN8_DRIVER_FAULT
BUGCHECK_STR: 0x3B
PROCESS_NAME: dwm.exe
CURRENT_IRQL: 0
LAST_CONTROL_TRANSFER: from fffff8800510c45a to fffff880051aad95
STACK_TEXT:
fffff880`1a49fab0 fffff880`0510c45a : 00000000`00000000 fffff880`1a49fae0 fffffa80`0da2e5c0 0000041a`00000690 : atikmdag+0x14bd95
fffff880`1a49fac0 fffff880`050fd0b3 : fffffa80`12a47040 fffffa80`12a47040 ffff0b96`d51c7ac7 fffffa80`12a45b01 : atikmdag+0xad45a
fffff880`1a49faf0 fffff880`05115d10 : fffff880`1a49fb60 fffff880`0510c45a 00000000`00000000 fffff880`1a49fb60 : atikmdag+0x9e0b3
fffff880`1a49fb30 fffff880`0510ebab : 00000000`00000000 fffff880`050fd0b3 fffffa80`0cc1f048 fffffa80`11d4d040 : atikmdag+0xb6d10
fffff880`1a49fb60 fffff880`05114cb5 : fffffa80`0da2e5c0 fffff880`1a49fce0 00000000`00000001 000000f4`00000000 : atikmdag+0xafbab
fffff880`1a49fbb0 fffff880`04ae56ab : fffffa80`12a47060 fffff880`00000000 fffffa80`00000000 00000000`000003d0 : atikmdag+0xb5cb5
fffff880`1a49fc70 fffff880`04190c2c : fffffa80`11d4d040 fffff880`1a4a0750 00000000`00000000 fffff8a0`028b5000 : atikmpag+0xc6ab
fffff880`1a49ff50 fffff880`0413ef6e : fffff880`1a4a0750 fffff880`1a4a07a1 00000000`00000001 00000000`00000000 : dxgkrnl!ADAPTER_RENDER:
diOpenAllocation+0x7c
fffff880`1a49ffa0 fffff880`0413e1d3 : fffff8a0`028b5000 fffff880`1a4a0750 fffff880`1a4a0490 fffff8a0`0c8be160 : dxgkrnl!DXGDEVICE::OpenAllocations+0x11e
fffff880`1a4a0050 fffff880`0414df25 : fffff880`00000799 fffff880`1a4a07a1 00000000`00000000 00000000`00000701 : dxgkrnl!DXGDEVICE::CreateAllocation+0x4c3
fffff880`1a4a06c0 fffff880`041483e9 : fffff8a0`00000238 fffff8a0`031024e0 fffff8a0`0c906490 00000000`00000000 : dxgkrnl!DXGDEVICE::OpenResource<_D3DKMT_OPENRESOURCEFROMNTHANDLE>+0x325
fffff880`1a4a07e0 fffff880`04148057 : 00000084`235ae3d0 00000000`887a0005 fffff8a0`00000001 fffff8a0`0c906400 : dxgkrnl!OpenResourceFromGlobalHandleOrNtObject<_D3DKMT_OPENRESOURCEFROMNTHANDLE>+0x349
fffff880`1a4a09d0 fffff800`3285d253 : 00000084`235ae3d0 00000000`00000020 00000084`235ae830 00000000`00000001 : dxgkrnl!DxgkOpenResourceFromNtHandle+0x193
fffff880`1a4a0b00 000007fd`102b233a : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x13
00000084`235ae378 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x000007fd`102b233a
FOLLOWUP_IP:
atikmdag+14bd95
fffff880`051aad95 8b4108 mov eax,dword ptr [rcx+8]
SYMBOL_STACK_INDEX: 0
SYMBOL_NAME: atikmdag+14bd95
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: atikmdag
IMAGE_NAME: atikmdag.sys
DEBUG_FLR_IMAGE_TIMESTAMP: 5154fbf8
STACK_COMMAND: .cxr 0xfffff8801a49f0b0 ; kb
FAILURE_BUCKET_ID: 0x3B_atikmdag+14bd95
BUCKET_ID: 0x3B_atikmdag+14bd95
Followup: MachineOwner
---------
This is happening daily, and is driving me nuts. Here are the results from analyzing the crash dump in the hopes that you guys can help:
thanks,
Microsoft (R) Windows Debugger Version 6.2.9200.16384 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [C:\Windows\MEMORY.DMP]
Kernel Bitmap Dump File: Only kernel address space is available
Symbol search path is: SRV*D:\symbols*http://msdl.microsoft.com/download/symbols
Executable search path is:
Windows 8 Kernel Version 9200 MP (8 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS
Built by: 9200.16551.amd64fre.win8_gdr.130306-1502
Machine Name:
Kernel base = 0xfffff800`32804000 PsLoadedModuleList = 0xfffff800`32ad0b00
Debug session time: Thu May 2 11:23:14.415 2013 (UTC - 4:00)
System Uptime: 0 days 0:10:21.057
Loading Kernel Symbols
...............................................................
................................................................
..................................
Loading User Symbols
PEB is paged out (Peb.Ldr = 000007f6`03edf018). Type ".hh dbgerr001" for details
Loading unloaded module list
..........
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
Use !analyze -v to get detailed debugging information.
BugCheck 3B, {c0000005, fffff880051aad95, fffff8801a49f0b0, 0}
*** ERROR: Module load completed but symbols could not be loaded for atikmdag.sys
*** ERROR: Module load completed but symbols could not be loaded for atikmpag.sys
Probably caused by : atikmdag.sys ( atikmdag+14bd95 )
Followup: MachineOwner
---------
2: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
SYSTEM_SERVICE_EXCEPTION (3b)
An exception happened while executing a system service routine.
Arguments:
Arg1: 00000000c0000005, Exception code that caused the bugcheck
Arg2: fffff880051aad95, Address of the instruction which caused the bugcheck
Arg3: fffff8801a49f0b0, Address of the context record for the exception that caused the bugcheck
Arg4: 0000000000000000, zero.
Debugging Details:
------------------
EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - The instruction at 0x%08lx referenced memory at 0x%08lx. The memory could not be %s.
FAULTING_IP:
atikmdag+14bd95
fffff880`051aad95 8b4108 mov eax,dword ptr [rcx+8]
CONTEXT: fffff8801a49f0b0 -- (.cxr 0xfffff8801a49f0b0)
rax=0000000600000003 rbx=0000000600000003 rcx=0000000600000003
rdx=0000000000000010 rsi=fffffa800da2e5c0 rdi=fffffa8012a47040
rip=fffff880051aad95 rsp=fffff8801a49fab0 rbp=fffff8801a49fab0
r8=0000000000000015 r9=0000000000000000 r10=0000000000000801
r11=fffff8801a4a03f0 r12=0000000040001fc0 r13=fffff8a00f32c200
r14=fffffa8012a47040 r15=0000000000000000
iopl=0 nv up ei pl nz na po nc
cs=0010 ss=0018 ds=002b es=002b fs=0053 gs=002b efl=00010206
atikmdag+0x14bd95:
fffff880`051aad95 8b4108 mov eax,dword ptr [rcx+8] ds:002b:00000006`0000000b=????????
Resetting default scope
DEFAULT_BUCKET_ID: WIN8_DRIVER_FAULT
BUGCHECK_STR: 0x3B
PROCESS_NAME: dwm.exe
CURRENT_IRQL: 0
LAST_CONTROL_TRANSFER: from fffff8800510c45a to fffff880051aad95
STACK_TEXT:
fffff880`1a49fab0 fffff880`0510c45a : 00000000`00000000 fffff880`1a49fae0 fffffa80`0da2e5c0 0000041a`00000690 : atikmdag+0x14bd95
fffff880`1a49fac0 fffff880`050fd0b3 : fffffa80`12a47040 fffffa80`12a47040 ffff0b96`d51c7ac7 fffffa80`12a45b01 : atikmdag+0xad45a
fffff880`1a49faf0 fffff880`05115d10 : fffff880`1a49fb60 fffff880`0510c45a 00000000`00000000 fffff880`1a49fb60 : atikmdag+0x9e0b3
fffff880`1a49fb30 fffff880`0510ebab : 00000000`00000000 fffff880`050fd0b3 fffffa80`0cc1f048 fffffa80`11d4d040 : atikmdag+0xb6d10
fffff880`1a49fb60 fffff880`05114cb5 : fffffa80`0da2e5c0 fffff880`1a49fce0 00000000`00000001 000000f4`00000000 : atikmdag+0xafbab
fffff880`1a49fbb0 fffff880`04ae56ab : fffffa80`12a47060 fffff880`00000000 fffffa80`00000000 00000000`000003d0 : atikmdag+0xb5cb5
fffff880`1a49fc70 fffff880`04190c2c : fffffa80`11d4d040 fffff880`1a4a0750 00000000`00000000 fffff8a0`028b5000 : atikmpag+0xc6ab
fffff880`1a49ff50 fffff880`0413ef6e : fffff880`1a4a0750 fffff880`1a4a07a1 00000000`00000001 00000000`00000000 : dxgkrnl!ADAPTER_RENDER:
fffff880`1a49ffa0 fffff880`0413e1d3 : fffff8a0`028b5000 fffff880`1a4a0750 fffff880`1a4a0490 fffff8a0`0c8be160 : dxgkrnl!DXGDEVICE::OpenAllocations+0x11e
fffff880`1a4a0050 fffff880`0414df25 : fffff880`00000799 fffff880`1a4a07a1 00000000`00000000 00000000`00000701 : dxgkrnl!DXGDEVICE::CreateAllocation+0x4c3
fffff880`1a4a06c0 fffff880`041483e9 : fffff8a0`00000238 fffff8a0`031024e0 fffff8a0`0c906490 00000000`00000000 : dxgkrnl!DXGDEVICE::OpenResource<_D3DKMT_OPENRESOURCEFROMNTHANDLE>+0x325
fffff880`1a4a07e0 fffff880`04148057 : 00000084`235ae3d0 00000000`887a0005 fffff8a0`00000001 fffff8a0`0c906400 : dxgkrnl!OpenResourceFromGlobalHandleOrNtObject<_D3DKMT_OPENRESOURCEFROMNTHANDLE>+0x349
fffff880`1a4a09d0 fffff800`3285d253 : 00000084`235ae3d0 00000000`00000020 00000084`235ae830 00000000`00000001 : dxgkrnl!DxgkOpenResourceFromNtHandle+0x193
fffff880`1a4a0b00 000007fd`102b233a : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x13
00000084`235ae378 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x000007fd`102b233a
FOLLOWUP_IP:
atikmdag+14bd95
fffff880`051aad95 8b4108 mov eax,dword ptr [rcx+8]
SYMBOL_STACK_INDEX: 0
SYMBOL_NAME: atikmdag+14bd95
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: atikmdag
IMAGE_NAME: atikmdag.sys
DEBUG_FLR_IMAGE_TIMESTAMP: 5154fbf8
STACK_COMMAND: .cxr 0xfffff8801a49f0b0 ; kb
FAILURE_BUCKET_ID: 0x3B_atikmdag+14bd95
BUCKET_ID: 0x3B_atikmdag+14bd95
Followup: MachineOwner
---------