Advertisement
Not a member of Pastebin yet?
Sign Up,
it unlocks many cool features!
- Microsoft (R) Windows Debugger Version 6.3.9600.17336 AMD64
- Copyright (c) Microsoft Corporation. All rights reserved.
- Loading Dump File [C:\Users\Alexa\Desktop\120616-37031-01.dmp]
- Mini Kernel Dump File: Only registers and stack trace are available
- ************* Symbol Path validation summary **************
- Response Time (ms) Location
- Deferred SRV*C:\Windows\symbol_cache*http://msdl.microsoft.com/download/symbols
- Symbol search path is: SRV*C:\Windows\symbol_cache*http://msdl.microsoft.com/download/symbols
- Executable search path is:
- Windows 7 Kernel Version 7601 (Service Pack 1) MP (2 procs) Free x64
- Product: WinNt, suite: TerminalServer SingleUserTS
- Built by: 7601.17514.amd64fre.win7sp1_rtm.101119-1850
- Machine Name:
- Kernel base = 0xfffff800`02a0f000 PsLoadedModuleList = 0xfffff800`02c54e90
- Debug session time: Tue Dec 6 18:25:26.360 2016 (UTC + 1:00)
- System Uptime: 0 days 0:10:06.125
- Loading Kernel Symbols
- ...............................................................
- ................................................................
- ..................
- Loading User Symbols
- Loading unloaded module list
- .......
- *******************************************************************************
- * *
- * Bugcheck Analysis *
- * *
- *******************************************************************************
- Use !analyze -v to get detailed debugging information.
- BugCheck 100000EA, {fffffa8004374870, 0, 0, 0}
- *** WARNING: Unable to verify timestamp for atikmdag.sys
- *** ERROR: Module load completed but symbols could not be loaded for atikmdag.sys
- Probably caused by : dxgkrnl.sys ( dxgkrnl!TdrTimedOperationBugcheckOnTimeout+37 )
- Followup: MachineOwner
- ---------
- 1: kd> !analyze -v
- *******************************************************************************
- * *
- * Bugcheck Analysis *
- * *
- *******************************************************************************
- THREAD_STUCK_IN_DEVICE_DRIVER_M (100000ea)
- The device driver is spinning in an infinite loop, most likely waiting for
- hardware to become idle. This usually indicates problem with the hardware
- itself or with the device driver programming the hardware incorrectly.
- If the kernel debugger is connected and running when watchdog detects a
- timeout condition then DbgBreakPoint() will be called instead of KeBugCheckEx()
- and detailed message including bugcheck arguments will be printed to the
- debugger. This way we can identify an offending thread, set breakpoints in it,
- and hit go to return to the spinning code to debug it further. Because
- KeBugCheckEx() is not called the .bugcheck directive will not return bugcheck
- information in this case. The arguments are already printed out to the kernel
- debugger. You can also retrieve them from a global variable via
- "dd watchdog!g_WdBugCheckData l5" (use dq on NT64).
- On MP machines it is possible to hit a timeout when the spinning thread is
- interrupted by hardware interrupt and ISR or DPC routine is running at the time
- of the bugcheck (this is because the timeout's work item can be delivered and
- handled on the second CPU and the same time). If this is the case you will have
- to look deeper at the offending thread's stack (e.g. using dds) to determine
- spinning code which caused the timeout to occur.
- Arguments:
- Arg1: fffffa8004374870, Pointer to a stuck thread object. Do .thread then kb on it to find
- the hung location.
- Arg2: 0000000000000000, Pointer to a DEFERRED_WATCHDOG object.
- Arg3: 0000000000000000, Pointer to offending driver name.
- Arg4: 0000000000000000, Number of times "intercepted" bugcheck 0xEA was hit (see notes).
- Debugging Details:
- ------------------
- FAULTING_THREAD: fffffa8004374870
- DEFAULT_BUCKET_ID: GRAPHICS_DRIVER_FAULT
- CUSTOMER_CRASH_COUNT: 1
- BUGCHECK_STR: 0xEA
- PROCESS_NAME: System
- CURRENT_IRQL: 0
- ANALYSIS_VERSION: 6.3.9600.17336 (debuggers(dbg).150226-1500) amd64fre
- LAST_CONTROL_TRANSFER: from fffff88004015f63 to fffff80002a8f640
- STACK_TEXT:
- fffff880`02e302a8 fffff880`04015f63 : 00000000`000000ea fffffa80`04374870 00000000`00000000 00000000`00000000 : nt!KeBugCheckEx
- fffff880`02e302b0 fffff880`04016112 : fffff880`02e30388 fffff880`0f0d02c0 fffff880`02e30388 fffff880`02e30450 : dxgkrnl!TdrTimedOperationBugcheckOnTimeout+0x37
- fffff880`02e30320 fffff880`0f07c703 : fffffa80`03ad7000 fffff880`02e30481 fffff880`02e30450 fffff880`0f0d02ac : dxgkrnl!TdrTimedOperationDelay+0xbe
- fffff880`02e30360 fffffa80`03ad7000 : fffff880`02e30481 fffff880`02e30450 fffff880`0f0d02ac 00000000`01312d00 : atikmdag+0x44703
- fffff880`02e30368 fffff880`02e30481 : fffff880`02e30450 fffff880`0f0d02ac 00000000`01312d00 fffff800`03000028 : 0xfffffa80`03ad7000
- fffff880`02e30370 fffff880`02e30450 : fffff880`0f0d02ac 00000000`01312d00 fffff800`03000028 fffff880`0f07c6d7 : 0xfffff880`02e30481
- fffff880`02e30378 fffff880`0f0d02ac : 00000000`01312d00 fffff800`03000028 fffff880`0f07c6d7 00000000`00000101 : 0xfffff880`02e30450
- fffff880`02e30380 00000000`01312d00 : fffff800`03000028 fffff880`0f07c6d7 00000000`00000101 00000000`00000080 : atikmdag+0x982ac
- fffff880`02e30388 fffff800`03000028 : fffff880`0f07c6d7 00000000`00000101 00000000`00000080 00000000`00009708 : 0x1312d00
- fffff880`02e30390 fffff880`0f07605e : 00000000`00000064 fffff800`03008a7b 00000000`0000000a 00000000`00000063 : hal!HalInitializeProcessor+0x88
- fffff880`02e303e0 00000000`00000064 : fffff800`03008a7b 00000000`0000000a 00000000`00000063 fffff880`02e30401 : atikmdag+0x3e05e
- fffff880`02e303e8 fffff800`03008a7b : 00000000`0000000a 00000000`00000063 fffff880`02e30401 00000000`00000002 : 0x64
- fffff880`02e303f0 fffff880`0f0d01ce : 00000000`00000001 00000000`00000064 fffff880`0f25b4c0 fffffa80`03ad7000 : hal!KeStallExecutionProcessor+0x183
- fffff880`02e30420 00000000`00000001 : 00000000`00000064 fffff880`0f25b4c0 fffffa80`03ad7000 fffff880`03600000 : atikmdag+0x981ce
- fffff880`02e30428 00000000`00000064 : fffff880`0f25b4c0 fffffa80`03ad7000 fffff880`03600000 00000000`0000ec00 : 0x1
- fffff880`02e30430 fffff880`0f25b4c0 : fffffa80`03ad7000 fffff880`03600000 00000000`0000ec00 fffffa80`042ea018 : 0x64
- fffff880`02e30438 fffffa80`03ad7000 : fffff880`03600000 00000000`0000ec00 fffffa80`042ea018 ffffffff`0000008c : atikmdag+0x2234c0
- fffff880`02e30440 fffff880`03600000 : 00000000`0000ec00 fffffa80`042ea018 ffffffff`0000008c fffffa80`00000000 : 0xfffffa80`03ad7000
- fffff880`02e30448 00000000`0000ec00 : fffffa80`042ea018 ffffffff`0000008c fffffa80`00000000 00000000`0000008b : 0xfffff880`03600000
- fffff880`02e30450 fffffa80`042ea018 : ffffffff`0000008c fffffa80`00000000 00000000`0000008b 00000009`00000048 : 0xec00
- fffff880`02e30458 ffffffff`0000008c : fffffa80`00000000 00000000`0000008b 00000009`00000048 fffff880`0f0d02ac : 0xfffffa80`042ea018
- fffff880`02e30460 fffffa80`00000000 : 00000000`0000008b 00000009`00000048 fffff880`0f0d02ac fffff880`02e30450 : 0xffffffff`0000008c
- fffff880`02e30468 00000000`0000008b : 00000009`00000048 fffff880`0f0d02ac fffff880`02e30450 00000001`000007d0 : 0xfffffa80`00000000
- fffff880`02e30470 00000009`00000048 : fffff880`0f0d02ac fffff880`02e30450 00000001`000007d0 00000000`00000000 : 0x8b
- fffff880`02e30478 fffff880`0f0d02ac : fffff880`02e30450 00000001`000007d0 00000000`00000000 00000000`00000000 : 0x00000009`00000048
- fffff880`02e30480 fffff880`02e30450 : 00000001`000007d0 00000000`00000000 00000000`00000000 00000000`00000000 : atikmdag+0x982ac
- fffff880`02e30488 00000001`000007d0 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0xfffff880`02e30450
- fffff880`02e30490 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00000001`000007d0
- STACK_COMMAND: .thread 0xfffffa8004374870 ; kb
- FOLLOWUP_IP:
- dxgkrnl!TdrTimedOperationBugcheckOnTimeout+37
- fffff880`04015f63 cc int 3
- SYMBOL_STACK_INDEX: 1
- SYMBOL_NAME: dxgkrnl!TdrTimedOperationBugcheckOnTimeout+37
- FOLLOWUP_NAME: MachineOwner
- MODULE_NAME: dxgkrnl
- IMAGE_NAME: dxgkrnl.sys
- DEBUG_FLR_IMAGE_TIMESTAMP: 4ce799fa
- IMAGE_VERSION: 6.1.7601.17514
- FAILURE_BUCKET_ID: X64_0xEA_IMAGE_dxgkrnl.sys
- BUCKET_ID: X64_0xEA_IMAGE_dxgkrnl.sys
- ANALYSIS_SOURCE: KM
- FAILURE_ID_HASH_STRING: km:x64_0xea_image_dxgkrnl.sys
- FAILURE_ID_HASH: {b58a0dfd-90f3-63cd-1b07-7ce1b53744cb}
- Followup: MachineOwner
- ---------
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement