AnsweredAssumed Answered

Radeon driver 19.9.2 and 19.10.2 - atikmdag.sys - UNEXPECTED_KERNEL_MODE_TRAP

Question asked by krjdev on Nov 2, 2019
Latest reply on Nov 3, 2019 by hardcoregames™

Hi,

 

 

 

 

 

I get a BSOD when I close Anno 1800 with the latest AMD driver (19.9.2 and 19.9.10).

 

 

 

Here is the output from WinDbg:

 

  

*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************

  

UNEXPECTED_KERNEL_MODE_TRAP (7f)
This means a trap occurred in kernel mode, and it's a trap of a kind
that the kernel isn't allowed to have/catch (bound trap) or that
is always instant death (double fault). The first number in the
bugcheck params is the number of the trap (8 = double fault, etc)
Consult an Intel x86 family manual to learn more about what these
traps are. Here is a *portion* of those codes:
If kv shows a taskGate
use .tss on the part before the colon, then kv.
Else if kv shows a trapframe
use .trap on that value
Else
.trap on the appropriate frame will show where the trap was taken
(on x86, this will be the ebp that goes with the procedure KiTrap)
Endif
kb will then show the corrected stack.
Arguments:
Arg1: 0000000000000008, EXCEPTION_DOUBLE_FAULT
Arg2: ffff8c015108af90
Arg3: ffffc108a8615ff0
Arg4: fffff8061a6c7329

  

Debugging Details:
------------------

  

Page 116d74 not present in the dump file. Type ".hh dbgerr004" for details
Page 116d74 not present in the dump file. Type ".hh dbgerr004" for details
Page 116d74 not present in the dump file. Type ".hh dbgerr004" for details
Page 116d74 not present in the dump file. Type ".hh dbgerr004" for details
Page 116d74 not present in the dump file. Type ".hh dbgerr004" for details
Page 116d74 not present in the dump file. Type ".hh dbgerr004" for details
Page 116d74 not present in the dump file. Type ".hh dbgerr004" for details
Page 116d74 not present in the dump file. Type ".hh dbgerr004" for details
Page 116d74 not present in the dump file. Type ".hh dbgerr004" for details
Page 116d74 not present in the dump file. Type ".hh dbgerr004" for details
Page 116d74 not present in the dump file. Type ".hh dbgerr004" for details
Page 116d74 not present in the dump file. Type ".hh dbgerr004" for details
Page 116d74 not present in the dump file. Type ".hh dbgerr004" for details
Page 116d74 not present in the dump file. Type ".hh dbgerr004" for details
Page 116d74 not present in the dump file. Type ".hh dbgerr004" for details
Page 116d74 not present in the dump file. Type ".hh dbgerr004" for details
Page 116d74 not present in the dump file. Type ".hh dbgerr004" for details
Page 116d74 not present in the dump file. Type ".hh dbgerr004" for details
Page 116d74 not present in the dump file. Type ".hh dbgerr004" for details
Page 116d74 not present in the dump file. Type ".hh dbgerr004" for details
Page 116d74 not present in the dump file. Type ".hh dbgerr004" for details
Page 116d74 not present in the dump file. Type ".hh dbgerr004" for details
Page 116d74 not present in the dump file. Type ".hh dbgerr004" for details
Page 116d74 not present in the dump file. Type ".hh dbgerr004" for details
Page 116d74 not present in the dump file. Type ".hh dbgerr004" for details
Page 116d74 not present in the dump file. Type ".hh dbgerr004" for details
Page 116d74 not present in the dump file. Type ".hh dbgerr004" for details
Page 116d74 not present in the dump file. Type ".hh dbgerr004" for details
Page 116d74 not present in the dump file. Type ".hh dbgerr004" for details
Page 116d74 not present in the dump file. Type ".hh dbgerr004" for details
Page 116d74 not present in the dump file. Type ".hh dbgerr004" for details
Page 116d74 not present in the dump file. Type ".hh dbgerr004" for details
Page 116d74 not present in the dump file. Type ".hh dbgerr004" for details
Page 116d74 not present in the dump file. Type ".hh dbgerr004" for details
Page 116d74 not present in the dump file. Type ".hh dbgerr004" for details
Page 116d74 not present in the dump file. Type ".hh dbgerr004" for details
Page 116d74 not present in the dump file. Type ".hh dbgerr004" for details
Page 116d74 not present in the dump file. Type ".hh dbgerr004" for details
Page 116d74 not present in the dump file. Type ".hh dbgerr004" for details
Page 116d74 not present in the dump file. Type ".hh dbgerr004" for details
Page 116d74 not present in the dump file. Type ".hh dbgerr004" for details
Page 116d74 not present in the dump file. Type ".hh dbgerr004" for details
Page 116d74 not present in the dump file. Type ".hh dbgerr004" for details
Page 116d74 not present in the dump file. Type ".hh dbgerr004" for details
Page 116d74 not present in the dump file. Type ".hh dbgerr004" for details
Page 116d74 not present in the dump file. Type ".hh dbgerr004" for details
Page 116d74 not present in the dump file. Type ".hh dbgerr004" for details
Page 116d74 not present in the dump file. Type ".hh dbgerr004" for details
Page 116d74 not present in the dump file. Type ".hh dbgerr004" for details
Page 116d74 not present in the dump file. Type ".hh dbgerr004" for details
Page 116d74 not present in the dump file. Type ".hh dbgerr004" for details
Page 116d74 not present in the dump file. Type ".hh dbgerr004" for details
Page 116d74 not present in the dump file. Type ".hh dbgerr004" for details
Page 116d74 not present in the dump file. Type ".hh dbgerr004" for details
Page 116d74 not present in the dump file. Type ".hh dbgerr004" for details
Page 116d74 not present in the dump file. Type ".hh dbgerr004" for details

  

KEY_VALUES_STRING: 1

  


PROCESSES_ANALYSIS: 1

  

SERVICE_ANALYSIS: 1

  

STACKHASH_ANALYSIS: 1

  

TIMELINE_ANALYSIS: 1

  


DUMP_CLASS: 1

  

DUMP_QUALIFIER: 401

  

BUILD_VERSION_STRING: 18362.1.amd64fre.19h1_release.190318-1202

  

SYSTEM_MANUFACTURER: System manufacturer

  

SYSTEM_PRODUCT_NAME: System Product Name

  

SYSTEM_SKU: To Be Filled By O.E.M.

  

SYSTEM_VERSION: System Version

  

BIOS_VENDOR: American Megatrends Inc.

  

BIOS_VERSION: 0408

  

BIOS_DATE: 07/20/2009

  

BASEBOARD_MANUFACTURER: ASUSTeK Computer INC.

  

BASEBOARD_PRODUCT: P5QL/EPU

  

BASEBOARD_VERSION: Rev X.0x

  

DUMP_TYPE: 1

  

BUGCHECK_P1: 8

  

BUGCHECK_P2: ffff8c015108af90

  

BUGCHECK_P3: ffffc108a8615ff0

  

BUGCHECK_P4: fffff8061a6c7329

  

BUGCHECK_STR: 0x7f_8

  

TRAP_FRAME: ffff8c015108af90 -- (.trap 0xffff8c015108af90)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=ffffc108a8616038 rbx=0000000000000000 rcx=000000000010000b
rdx=ffffc108a8616010 rsi=0000000000000000 rdi=0000000000000000
rip=fffff8061a6c7329 rsp=ffffc108a8615ff0 rbp=ffffc108a8616580
r8=ffffc108a8616678 r9=0000000000000000 r10=000000000010000b
r11=ffffc108a8616080 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei pl zr na po nc
nt!RtlInitializeExtendedContext2+0x2d:
fffff806`1a6c7329 e822010000 call nt!RtlpValidateContextFlags (fffff806`1a6c7450)
Resetting default scope

  

CPU_COUNT: 4

  

CPU_MHZ: c69

  

CPU_VENDOR: GenuineIntel

  

CPU_FAMILY: 6

  

CPU_MODEL: 17

  

CPU_STEPPING: a

  

CPU_MICROCODE: 6,17,a,0 (F,M,S,R) SIG: A0B'00000000 (cache) A0B'00000000 (init)

  

BLACKBOXBSD: 1 (!blackboxbsd)

  


BLACKBOXNTFS: 1 (!blackboxntfs)

  


BLACKBOXWINLOGON: 1

  

DEFAULT_BUCKET_ID: WIN8_DRIVER_FAULT

  

PROCESS_NAME: csrss.exe

  

CURRENT_IRQL: 0

  

ANALYSIS_SESSION_HOST: KRJ-P5QLE

  

ANALYSIS_SESSION_TIME: 11-02-2019 13:02:51.0233

  

ANALYSIS_VERSION: 10.0.18362.1 amd64fre

  

EXCEPTION_RECORD: fffff2f97cbe5000 -- (.exr 0xfffff2f97cbe5000)
ExceptionAddress: 0000000000000000
ExceptionCode: 026d6867
ExceptionFlags: 0a000001
NumberParameters: 254666855
Parameter[0]: 0000000000000000
Parameter[1]: 0000000000000000
Parameter[2]: 0000000000000000
Parameter[3]: 0000000000000000
Parameter[4]: 0000000000000000
Parameter[5]: 0000000000000000
Parameter[6]: 0000000000000000
Parameter[7]: 0000000000000000
Parameter[8]: 0000000000000000
Parameter[9]: 0000000000000000
Parameter[10]: 0000000000000000
Parameter[11]: 0000000000000000
Parameter[12]: 0000000000000000
Parameter[13]: 0000000000000000
Parameter[14]: 0000000000000000

  

LAST_CONTROL_TRANSFER: from fffff8061a7d32e9 to fffff8061a7c1410

  

STACK_OVERFLOW: Stack Limit: ffffc108a8616000. Use (kF) and (!stackusage) to investigate stack usage.

  

STACKUSAGE_IMAGE: The module at base 0xFFFFF80AC4730000 was blamed for the stack overflow. It is using 7552 bytes of stack.

  

STACK_TEXT:
Page 116d74 not present in the dump file. Type ".hh dbgerr004" for details
Page 116d74 not present in the dump file. Type ".hh dbgerr004" for details
Page 116d74 not present in the dump file. Type ".hh dbgerr004" for details
Page 116d74 not present in the dump file. Type ".hh dbgerr004" for details
Page 116d74 not present in the dump file. Type ".hh dbgerr004" for details
Page 116d74 not present in the dump file. Type ".hh dbgerr004" for details
ffffc108`a8615ff0 fffff806`1a6c54a0 : ffffc108`a8617748 ffffc108`a8616580 00000000`00000000 00000000`00000000 : nt!RtlInitializeExtendedContext2+0x2d
ffffc108`a8616040 fffff806`1a79c53f : fffff80a`c455b74c ffffc108`00000001 ffffc108`a8617980 ffffc108`a861c000 : nt!RtlUnwindEx+0x120
ffffc108`a8616770 fffff806`1a7ca23f : ffffc108`a8617980 ffffc108`a8616d50 00000000`00000000 00000000`0010001f : nt!_C_specific_handler+0xef
ffffc108`a86167e0 fffff806`1a6c33c5 : ffffc108`a8617748 00000000`00000000 ffffc108`a8616d50 00007fff`ffff0000 : nt!RtlpExecuteHandlerForException+0xf
ffffc108`a8616810 fffff806`1a6c795e : ffffc108`a8617748 ffffc108`a8617490 ffffc108`a8617748 00000058`6254c000 : nt!RtlDispatchException+0x4a5
ffffc108`a8616f60 fffff806`1a7d341d : fffff2f9`7cbe5000 ffffc108`a86177f0 ffff8000`00000000 00000058`6254d7b8 : nt!KiDispatchException+0x16e
ffffc108`a8617610 fffff806`1a7cf605 : 00000000`00000000 00000000`00000001 00000000`00000000 ffffc108`a86178a8 : nt!KiExceptionDispatch+0x11d
ffffc108`a86177f0 fffff80a`c454ad35 : 00000000`00000003 ffffc108`a86179f8 01d5916c`2c124649 00000000`00000000 : nt!KiPageFault+0x445
ffffc108`a8617980 fffff80a`c459f4df : ffffc108`a8617bc8 00000000`00000000 00000000`00000000 ffffd983`6e58dbc0 : cldflt!HsmOsIsCbdTransacted+0x41
ffffc108`a86179c0 fffff80a`c45a0019 : 00000000`1000000c ffffd983`7117f198 ffffd983`71ad3c30 ffffc108`a8617c09 : cldflt!HsmiFltPreECPCREATE+0xaf
ffffc108`a8617b30 fffff806`1f2c4a5d : ffffd983`7117f010 ffffd983`00000000 ffffd983`00000003 00000000`00000000 : cldflt!HsmFltPreCREATE+0x9
ffffc108`a8617b60 fffff806`1f2c45a0 : ffffc108`a8617ce0 ffffc108`a8617c00 ffffd983`72cd0000 00000000`00000000 : FLTMGR!FltpPerformPreCallbacks+0x2fd
ffffc108`a8617c70 fffff806`1f2fcd13 : fffff806`1f2e9060 00000000`00000050 00000020`00000000 00000000`00000000 : FLTMGR!FltpPassThroughInternal+0x90
ffffc108`a8617ca0 fffff806`1a631f79 : 00000000`00000000 fffff806`1abe5b04 00000000`00000000 00000000`00000000 : FLTMGR!FltpCreate+0x2f3
ffffc108`a8617d50 fffff806`1a631024 : 00000000`00000003 00000000`00000000 00000000`00000000 fffff806`1a6317e3 : nt!IofCallDriver+0x59
ffffc108`a8617d90 fffff806`1abe61eb : ffffc108`a8618050 fffff806`1abe5b04 ffffc108`a8617fc0 ffffd983`72f17ab0 : nt!IoCallDriverWithTracing+0x34
ffffc108`a8617de0 fffff806`1abed1bf : ffffd983`6d141b80 ffffd983`6d141b04 ffffd983`74e5c8a0 00000000`00000000 : nt!IopParseDevice+0x62b
ffffc108`a8617f50 fffff806`1abeb621 : ffffd983`74e5c800 ffffc108`a8618198 00000000`000002c0 ffffd983`6a6cf400 : nt!ObpLookupObjectName+0x78f
ffffc108`a8618110 fffff806`1ac30df0 : ffffffff`00000001 ffffc108`a8618650 00000000`00000000 ffff8c01`51080180 : nt!ObOpenObjectByNameEx+0x201
ffffc108`a8618250 fffff806`1ac305b9 : ffffc108`a86185f0 ffffb100`00000000 ffffc108`a8618650 ffffc108`a8618630 : nt!IopCreateFile+0x820
ffffc108`a86182f0 fffff806`1a7d2d15 : ffffb10f`f4003d80 fffff80a`00000040 00000000`00000000 00000000`00000000 : nt!NtCreateFile+0x79
ffffc108`a8618380 fffff806`1a7c5250 : fffff80a`c47994ae 00000000`00000016 ffffc108`a8618690 00000000`0000012c : nt!KiSystemServiceCopyEnd+0x25
ffffc108`a8618588 fffff80a`c47994ae : 00000000`00000016 ffffc108`a8618690 00000000`0000012c 0000187a`c747de20 : nt!KiServiceLinkage
ffffc108`a8618590 fffff80a`c479f118 : 00000000`c0000001 ffffc108`a86188a9 00000000`00000000 ffffd983`6fa964d0 : atikmdag+0x694ae
ffffc108`a8618810 fffff80a`c47391c9 : fffff80a`c804d110 00000000`00000000 00000000`00000000 fffff80a`c4736f9f : atikmdag+0x6f118
ffffc108`a8618910 fffff80a`c473931e : ffffd983`6d192af0 fffff80a`00000030 00000000`00000000 fffff80a`c4e18790 : atikmdag+0x91c9
ffffc108`a8618970 fffff80a`c6191248 : ffffd983`6d192b18 00000000`0000001d 00000000`00000000 ffffc108`a8618a10 : atikmdag+0x931e
ffffc108`a86189a0 fffff80a`c61931a6 : ffffd983`6d192b18 ffffc108`a8618a10 fffff80a`c7fcc008 fffff80a`c7fcc1b4 : atikmdag+0x1a61248
ffffc108`a86189e0 fffff80a`c5cf0cdc : ffffd983`6e52d650 fffff80a`c7fcc008 fffff80a`c7fcc1b4 00000003`00000100 : atikmdag+0x1a631a6
ffffc108`a8618aa0 fffff80a`c5cf1e8e : ffffb10f`f473b3c0 ffffb100`0000000b ffffb10f`f8273d68 ffffc108`a8618e60 : atikmdag+0x15c0cdc
ffffc108`a8618af0 fffff80a`c5cfae29 : ffffb10f`f473b3c0 ffffb100`149b0040 ffffb10f`00000000 ffffc108`a86190c0 : atikmdag+0x15c1e8e
ffffc108`a8619030 fffff80a`c626244c : ffffb10f`f473b3e8 ffffb100`149b0040 00000000`00000002 ffffb10f`f8382de8 : atikmdag+0x15cae29
ffffc108`a86191c0 fffff80a`c6265d4c : ffffb10f`f8381000 ffffb10f`f8381000 ffffc108`a8619700 00000000`00000001 : atikmdag+0x1b3244c
ffffc108`a86192b0 fffff80a`c6258431 : ffffb10f`f8381038 ffffb10f`f4a32140 ffffc108`a8619901 00000000`00000000 : atikmdag+0x1b35d4c
ffffc108`a86198f0 fffff80a`c5c0e65d : ffffb10f`f8381038 ffffb10f`f4a32140 ffffb10f`f4a32140 ffffc108`a8619a30 : atikmdag+0x1b28431
ffffc108`a86199e0 fffff80a`c47e2594 : ffffb10f`f4a32028 ffffc108`a8619b58 ffffc108`a861a1b0 fffff806`1a6e7739 : atikmdag+0x14de65d
ffffc108`a8619b30 fffff80a`c47e1d58 : 00000000`00000001 00000000`000000a0 ffffd983`6d99f020 fffff80a`c47e369b : atikmdag+0xb2594
ffffc108`a861a0d0 fffff80a`c47ef636 : 00000001`00000000 ffffb10f`f84cc200 ffffd983`6e52a650 ffffcdf6`c00efdb9 : atikmdag+0xb1d58
ffffc108`a861a130 fffff80a`c47ed0d1 : ffffd983`6d789000 ffffd983`6d9e66d0 ffffc108`a861a1b0 ffffb10f`f84cc200 : atikmdag+0xbf636
ffffc108`a861a190 fffff80a`c475abed : ffffd983`6fc20950 00000000`00000a01 ffffb10f`f84cc240 00000000`00000000 : atikmdag+0xbd0d1
ffffc108`a861a220 fffff80a`c47634c8 : 00000000`00000000 fffff80a`c4ab1268 00000000`00000001 ffffd983`6d25b8f0 : atikmdag+0x2abed
ffffc108`a861a2e0 fffff80a`bed59491 : 00000000`00000000 ffffc108`a861a658 00000000`00000000 00000000`00000000 : atikmdag+0x334c8
ffffc108`a861a310 fffff80a`bed51916 : ffffd983`6d787000 ffffc108`a861a499 ffffd983`6d25b8c0 fffff806`1a637530 : atikmpag+0x19491
ffffc108`a861a340 fffff80a`be90fd05 : 00000000`00000000 ffffc108`a861a499 ffffc108`a861a658 00000000`00000001 : atikmpag+0x11916
ffffc108`a861a3e0 fffff80a`be89b85a : ffffb10f`f474a2b0 ffffc108`a861a620 ffffb10f`f474a2b0 00000000`00000008 : dxgkrnl!ADAPTER_DISPLAY::DdiSetTimingsFromVidPn+0x19d
ffffc108`a861a500 fffff80a`be7dc068 : ffffd983`6d9a4c00 fffff80a`00000001 00000000`00020000 ffffc108`a861a8d0 : dxgkrnl!VIDPN_MGR::SetTimingsFromVidPn+0xbefb6
ffffc108`a861a7a0 fffff80a`be7db734 : 00000000`00000000 ffffc108`a861a910 ffffc108`a861ac70 00000000`00000000 : dxgkrnl!DmmSetTimingsOnAdapter+0xe0
ffffc108`a861a810 fffff80a`be7da859 : 00000000`00000000 00000000`00000000 00000000`00000000 ffffc108`a861ac70 : dxgkrnl!CCD_TOPOLOGY::ApplyTopologyOnAdapter+0x254
ffffc108`a861aa00 fffff80a`be7d9d58 : 00000000`00000000 ffffc108`a861b180 ffffc108`a861ac70 00000000`000000ff : dxgkrnl!CCD_TOPOLOGY::ApplyTopologyWorker+0x6bd
ffffc108`a861ab80 fffff80a`be7d816e : fffff95e`007eb010 ffffc108`a861b180 ffffc108`a861ac89 00000000`00000001 : dxgkrnl!CCD_TOPOLOGY::ApplyTopology+0x88
ffffc108`a861ac30 fffff931`8681ce88 : 00000000`00000000 fffff95e`02ec9a20 fffff95e`007eb010 fffff95e`007eb010 : dxgkrnl!DxgkApplyPathsModality+0xae
ffffc108`a861acf0 fffff931`8680372f : 00000000`00000000 ffffc108`a861ae90 fffff95e`02ec9a20 00000000`00000000 : win32kbase!ApplyPathsModality+0x80
ffffc108`a861ad90 fffff931`867b9107 : 00000000`00000000 00000000`00000000 ffffc108`0000088f 00000000`00000000 : win32kbase!DrvSetDisplayConfig+0x68f
ffffc108`a861af80 fffff931`868800c2 : ffffd983`00000000 00000000`00000000 ffffc108`0000088f ffffd983`6d9f7b40 : win32kbase!xxxUserSetDisplayConfig+0x257
ffffc108`a861b060 fffff931`867d0956 : fffff95e`02992010 ffffd983`73994080 fffff95e`02992010 fffff931`869c9640 : win32kbase!xxxDestroyThreadInfo+0xb4f0a
ffffc108`a861b230 fffff931`864b0906 : 00000000`00000001 00000000`00000001 00000000`00000000 7fffd983`6fcf6f50 : win32kbase!UserThreadCallout+0x466
ffffc108`a861b420 fffff931`867d5f98 : 00000000`00000001 ffffc108`a861b550 fffff806`1aa38958 ffffc108`a861b4f0 : win32kfull!W32pThreadCallout+0x76
ffffc108`a861b450 fffff931`86dd103b : fffff806`1aa38958 fffff806`1a69c700 ffffd983`6fcf6df0 ffffd983`6daa14b0 : win32kbase!W32CalloutDispatch+0x358
ffffc108`a861b670 fffff806`1abca6f1 : 00000000`00000000 ffffc108`a861b700 00060030`00010002 00000000`00000000 : win32k!W32CalloutDispatchThunk+0xb
ffffc108`a861b6a0 fffff806`1ac5eb8b : ffffd983`6fcf6df0 ffffc108`a861b879 00000000`00000000 00000000`00000000 : nt!ExCallCallBack+0x3d
ffffc108`a861b6d0 fffff806`1accc863 : 00000000`c0000409 00000000`00000001 00000000`00000000 00000000`00000000 : nt!PspExitThread+0x4e3
ffffc108`a861b7e0 fffff806`1a63e551 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSchedulerApcTerminate+0x33
ffffc108`a861b820 fffff806`1a7c5990 : ffffee80`062a4b01 ffffc108`a861b8e0 d9837328`acf80470 ffffd983`00000000 : nt!KiDeliverApc+0x481
ffffc108`a861b8e0 fffff806`1a7d37b9 : ffffd983`73b97640 fffff806`1a674ef6 00000000`00008000 ffffc108`a861bc00 : nt!KiInitiateUserApc+0x70
ffffc108`a861ba20 fffff806`1a7d1aa5 : ffffd983`73994080 00000000`00000000 00000058`626fde30 000001eb`415bce90 : nt!KiFastFailDispatch+0x179
ffffc108`a861bc00 00007ffe`e7a7cf18 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiRaiseSecurityCheckFailure+0x325
00000058`626fdc00 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffe`e7a7cf18

  


STACK_COMMAND: .trap 0xffff8c015108af90 ; kb

  

THREAD_SHA1_HASH_MOD_FUNC: 32f247ed33e332fcb8961bdfa5109fac0191cd70

  

THREAD_SHA1_HASH_MOD_FUNC_OFFSET: 1a158395306b4a7677ea6eab5c3d7068d11bb343

  

THREAD_SHA1_HASH_MOD: d15c145ccca3b3d4ca551aed3ccfa816a8ddb261

  

FOLLOWUP_NAME: MachineOwner

  

MODULE_NAME: atikmdag

  

IMAGE_NAME: atikmdag.sys

  

DEBUG_FLR_IMAGE_TIMESTAMP: 5d781907

  

FAILURE_BUCKET_ID: 0x7f_8_STACK_USAGE_IMAGE_atikmdag.sys

  

BUCKET_ID: 0x7f_8_STACK_USAGE_IMAGE_atikmdag.sys

  

PRIMARY_PROBLEM_CLASS: 0x7f_8_STACK_USAGE_IMAGE_atikmdag.sys

  

TARGET_TIME: 2019-11-02T10:59:45.000Z

  

OSBUILD: 18362

  

OSSERVICEPACK: 0

  

SERVICEPACK_NUMBER: 0

  

OS_REVISION: 0

  

SUITE_MASK: 272

  

PRODUCT_TYPE: 1

  

OSPLATFORM_TYPE: x64

  

OSNAME: Windows 10

  

OSEDITION: Windows 10 WinNt TerminalServer SingleUserTS

  

OS_LOCALE:

  

USER_LCID: 0

  

OSBUILD_TIMESTAMP: 2011-01-12 14:55:39

  

BUILDDATESTAMP_STR: 190318-1202

  

BUILDLAB_STR: 19h1_release

  

BUILDOSVER_STR: 10.0.18362.1.amd64fre.19h1_release.190318-1202

  

ANALYSIS_SESSION_ELAPSED_TIME: 320c

  

ANALYSIS_SOURCE: KM

  

FAILURE_ID_HASH_STRING: km:0x7f_8_stack_usage_image_atikmdag.sys

  

FAILURE_ID_HASH: {7e176896-abd3-d293-5329-1d412dc48b33}

  

Followup: MachineOwner
---------

  

2: kd> lmvm atikmdag
Browse full module list
start end module name
fffff80a`c4730000 fffff80a`c8142000 atikmdag (no symbols)
Loaded symbol image file: atikmdag.sys
Image path: \SystemRoot\System32\DriverStore\FileRepository\c0346940.inf_amd64_0108ab6308500962\B346681\atikmdag.sys
Image name: atikmdag.sys
Browse all global symbols functions data
Timestamp: Tue Sep 10 14:43:35 2019 (5D781907)
CheckSum: 039D490B
ImageSize: 03A12000
Translations: 0000.04b0 0000.04e4 0409.04b0 0409.04e4
Information from resource tables:

 

 

 

No issues with older driver (version 19.5.2).

 

 

 

Thanks in advance!

Outcomes