Microsoft (R) Windows Debugger Version 6.12.0002.633 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [D:\ DOWNLOADS\ DUMPS\MmatoO\030211-39312-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
Symbol search path is: SRV*C:\XSymCache*http://msdl.microsoft.com/download/symbols
Executable search path is:
Windows 7 Kernel Version 7600 MP (4 procs) Free x86 compatible
Product: WinNt, suite: TerminalServer SingleUserTS
Built by: 7600.16695.x86fre.win7_gdr.101026-1503
Machine Name:
Kernel base = 0x82c0b000 PsLoadedModuleList = 0x82d53810
Debug session time: Wed Mar 2 20:37:51.257 2011 (UTC + 0:00)
System Uptime: 0 days 3:29:51.927
Loading Kernel Symbols
...............................................................
................................................................
.......................................
Loading User Symbols
Loading unloaded module list
......
Unable to load image \SystemRoot\system32\DRIVERS\atikmdag.sys, Win32 error 0n2
*** WARNING: Unable to verify timestamp for atikmdag.sys
*** ERROR: Module load completed but symbols could not be loaded for atikmdag.sys
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
Use !analyze -v to get detailed debugging information.
BugCheck 1000008E, {c0000005, 95a64b55, b2fc6794, 0}
*** WARNING: Unable to verify timestamp for atikmpag.sys
*** ERROR: Module load completed but symbols could not be loaded for atikmpag.sys
Probably caused by : atikmdag.sys ( atikmdag+4ab55 )
Followup: MachineOwner
---------
3: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
KERNEL_MODE_EXCEPTION_NOT_HANDLED_M (1000008e)
This is a very common bugcheck. Usually the exception address pinpoints
the driver/function that caused the problem. Always note this address
as well as the link date of the driver/image that contains this address.
Some common problems are exception code 0x80000003. This means a hard
coded breakpoint or assertion was hit, but this system was booted
/NODEBUG. This is not supposed to happen as developers should never have
hardcoded breakpoints in retail code, but ...
If this happens, make sure a debugger gets connected, and the
system is booted /DEBUG. This will let us see why this breakpoint is
happening.
Arguments:
Arg1: c0000005, The exception code that was not handled
Arg2: 95a64b55, The address that the exception occurred at
Arg3: b2fc6794, Trap Frame
Arg4: 00000000
Debugging Details:
------------------
EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - The instruction at 0x%08lx referenced memory at 0x%08lx. The memory could not be %s.
FAULTING_IP:
atikmdag+4ab55
95a64b55 ff7020 push dword ptr [eax+20h]
TRAP_FRAME: b2fc6794 -- (.trap 0xffffffffb2fc6794)
ErrCode = 00000000
eax=00000000 ebx=95d82194 ecx=885f2260 edx=95d84c78 esi=885f2260 edi=885f2418
eip=95a64b55 esp=b2fc6808 ebp=b2fc6814 iopl=0 nv up ei pl zr na pe nc
cs=0008 ss=0010 ds=0023 es=0023 fs=0030 gs=0000 efl=00010246
atikmdag+0x4ab55:
95a64b55 ff7020 push dword ptr [eax+20h] ds:0023:00000020=????????
Resetting default scope
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT
BUGCHECK_STR: 0x8E
PROCESS_NAME: dwm.exe
CURRENT_IRQL: 0
LAST_CONTROL_TRANSFER: from 95cc9c80 to 95a64b55
STACK_TEXT:
WARNING: Stack unwind information not available. Following frames may be wrong.
b2fc6814 95cc9c80 00000000 00000015 88614000 atikmdag+0x4ab55
b2fc6864 95cc9e84 00000000 00000000 00000000 atikmdag+0x2afc80
b2fc6884 95a29514 b2fc68e8 00000000 871ba540 atikmdag+0x2afe84
b2fc68a0 94ea4d14 871a1dc0 b2fc68e8 830206ee atikmdag+0xf514
b2fc6a0c 960c34f2 871a1dc0 b2fc6a4c 00000000 atikmpag+0x5d14
b2fc6a34 960f7213 b2fc6a4c 00000000 b3704008 dxgkrnl!DXGADAPTER::DdiSetVidPnSourceAddress+0x65
b2fc6b88 960f58f8 a4c111f8 0000000f b3704008 dxgkrnl!DXGADAPTER::UpdateModeWithPrimary+0xf1
b2fc6c68 960f53d9 00000000 00000001 00000001 dxgkrnl!DXGDEVICE::SetDisplayMode+0x2be
b2fc6d18 82718216 006bf574 006bf560 b2fc6d34 dxgkrnl!DxgkSetDisplayMode+0x6a4
b2fc6d28 82c4e43a 006bf574 006bf5a0 76e56344 win32k!NtGdiDdDDISetDisplayMode+0x14
b2fc6d28 76e56344 006bf574 006bf5a0 76e56344 nt!KiFastCallEntry+0x12a
006bf5a0 00000000 00000000 00000000 00000000 0x76e56344
STACK_COMMAND: kb
FOLLOWUP_IP:
atikmdag+4ab55
95a64b55 ff7020 push dword ptr [eax+20h]
SYMBOL_STACK_INDEX: 0
SYMBOL_NAME: atikmdag+4ab55
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: atikmdag
IMAGE_NAME: atikmdag.sys
DEBUG_FLR_IMAGE_TIMESTAMP: 4cdb582f
FAILURE_BUCKET_ID: 0x8E_atikmdag+4ab55
BUCKET_ID: 0x8E_atikmdag+4ab55
Followup: MachineOwner