1: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
KERNEL_MODE_EXCEPTION_NOT_HANDLED (8e)
This is a very common bugcheck. Usually the exception address pinpoints
the driver/function that caused the problem. Always note this address
as well as the link date of the driver/image that contains this address.
Some common problems are exception code 0x80000003. This means a hard
coded breakpoint or assertion was hit, but this system was booted
/NODEBUG. This is not supposed to happen as developers should never have
hardcoded breakpoints in retail code, but ...
If this happens, make sure a debugger gets connected, and the
system is booted /DEBUG. This will let us see why this breakpoint is
happening.
Arguments:
Arg1: c0000005, The exception code that was not handled
Arg2: 99c732a7, The address that the exception occurred at
Arg3: 886f9794, Trap Frame
Arg4: 00000000
Debugging Details:
------------------
*** ERROR: Module load completed but symbols could not be loaded for atikmdag.sys
*** ERROR: Module load completed but symbols could not be loaded for atikmpag.sys
Page 5c4e5 not present in the dump file. Type ".hh dbgerr004" for details
EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - The instruction at 0x%08lx referenced memory at 0x%08lx. The memory could not be %s.
FAULTING_IP:
atikmdag+4a2a7
99c732a7 ff7020 push dword ptr [eax+20h]
TRAP_FRAME: 886f9794 -- (.trap 0xffffffff886f9794)
ErrCode = 00000000
eax=00000000 ebx=99f91194 ecx=86b9b7b8 edx=99f93e78 esi=86b9b7b8 edi=86d10008
eip=99c732a7 esp=886f9808 ebp=886f9814 iopl=0 nv up ei pl zr na pe nc
cs=0008 ss=0010 ds=0023 es=0023 fs=0030 gs=0000 efl=00010246
atikmdag+0x4a2a7:
99c732a7 ff7020 push dword ptr [eax+20h] ds:0023:00000020=????????
Resetting default scope
DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT
BUGCHECK_STR: 0x8E
PROCESS_NAME: dwm.exe
CURRENT_IRQL: 0
LAST_CONTROL_TRANSFER: from 82f07382 to 82f26d10
STACK_TEXT:
886f9304 82f07382 0000008e c0000005 99c732a7 nt!KeBugCheckEx+0x1e
886f9724 82e8e036 886f9740 00000000 886f9794 nt!KiDispatchException+0x1ac
886f978c 82e8dfea 886f9814 99c732a7 badb0d00 nt!CommonDispatchException+0x4a
886f9794 99c732a7 badb0d00 99f93e78 00000001 nt!Kei386EoiHelper+0x192
WARNING: Stack unwind information not available. Following frames may be wrong.
886f9814 99ed8515 00000000 00000015 867ae000 atikmdag+0x4a2a7
886f9864 99ed871c 863ee0a8 00000000 00000000 atikmdag+0x2af515
886f9884 99c3850b 886f98e8 00000000 8671c940 atikmdag+0x2af71c
886f98a0 90461d34 865feb80 886f98e8 82e186ee atikmdag+0xf50b
886f9a0c 9a2d14f2 865feb80 886f9a4c 00000000 atikmpag+0x5d34
886f9a34 9a3050cd 886f9a4c 00000000 afeb25b0 dxgkrnl!DXGADAPTER:

diSetVidPnSourceAddress+0x65
886f9b88 9a3037b2 81e67f38 0000000f afeb25b0 dxgkrnl!DXGADAPTER::UpdateModeWithPrimary+0xf1
886f9c68 9a303293 00000000 00000001 00000001 dxgkrnl!DXGDEVICE::SetDisplayMode+0x2be
886f9d18 9a9381f0 00d0f58c 00d0f578 886f9d34 dxgkrnl!DxgkSetDisplayMode+0x6a4
886f9d28 82e8d44a 00d0f58c 00d0f5b8 774a64f4 win32k!NtGdiDdDDISetDisplayMode+0x14
886f9d28 774a64f4 00d0f58c 00d0f5b8 774a64f4 nt!KiFastCallEntry+0x12a
00d0f5b8 00000000 00000000 00000000 00000000 0x774a64f4
STACK_COMMAND: kb
FOLLOWUP_IP:
atikmdag+4a2a7
99c732a7 ff7020 push dword ptr [eax+20h]
SYMBOL_STACK_INDEX: 0
SYMBOL_NAME: atikmdag+4a2a7
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: atikmdag
IMAGE_NAME: atikmdag.sys
DEBUG_FLR_IMAGE_TIMESTAMP: 4cef1ec1
FAILURE_BUCKET_ID: 0x8E_atikmdag+4a2a7
BUCKET_ID: 0x8E_atikmdag+4a2a7
Followup: MachineOwner
---------