Advertisement
Guest User

Untitled

a guest
Dec 7th, 2016
162
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
text 8.69 KB | None | 0 0
  1.  
  2. Microsoft (R) Windows Debugger Version 6.3.9600.17336 AMD64
  3. Copyright (c) Microsoft Corporation. All rights reserved.
  4.  
  5.  
  6. Loading Dump File [C:\Users\Alexa\Desktop\120616-37031-01.dmp]
  7. Mini Kernel Dump File: Only registers and stack trace are available
  8.  
  9.  
  10. ************* Symbol Path validation summary **************
  11. Response Time (ms) Location
  12. Deferred SRV*C:\Windows\symbol_cache*http://msdl.microsoft.com/download/symbols
  13. Symbol search path is: SRV*C:\Windows\symbol_cache*http://msdl.microsoft.com/download/symbols
  14. Executable search path is:
  15. Windows 7 Kernel Version 7601 (Service Pack 1) MP (2 procs) Free x64
  16. Product: WinNt, suite: TerminalServer SingleUserTS
  17. Built by: 7601.17514.amd64fre.win7sp1_rtm.101119-1850
  18. Machine Name:
  19. Kernel base = 0xfffff800`02a0f000 PsLoadedModuleList = 0xfffff800`02c54e90
  20. Debug session time: Tue Dec 6 18:25:26.360 2016 (UTC + 1:00)
  21. System Uptime: 0 days 0:10:06.125
  22. Loading Kernel Symbols
  23. ...............................................................
  24. ................................................................
  25. ..................
  26. Loading User Symbols
  27. Loading unloaded module list
  28. .......
  29. *******************************************************************************
  30. * *
  31. * Bugcheck Analysis *
  32. * *
  33. *******************************************************************************
  34.  
  35. Use !analyze -v to get detailed debugging information.
  36.  
  37. BugCheck 100000EA, {fffffa8004374870, 0, 0, 0}
  38.  
  39. *** WARNING: Unable to verify timestamp for atikmdag.sys
  40. *** ERROR: Module load completed but symbols could not be loaded for atikmdag.sys
  41. Probably caused by : dxgkrnl.sys ( dxgkrnl!TdrTimedOperationBugcheckOnTimeout+37 )
  42.  
  43. Followup: MachineOwner
  44. ---------
  45.  
  46. 1: kd> !analyze -v
  47. *******************************************************************************
  48. * *
  49. * Bugcheck Analysis *
  50. * *
  51. *******************************************************************************
  52.  
  53. THREAD_STUCK_IN_DEVICE_DRIVER_M (100000ea)
  54. The device driver is spinning in an infinite loop, most likely waiting for
  55. hardware to become idle. This usually indicates problem with the hardware
  56. itself or with the device driver programming the hardware incorrectly.
  57. If the kernel debugger is connected and running when watchdog detects a
  58. timeout condition then DbgBreakPoint() will be called instead of KeBugCheckEx()
  59. and detailed message including bugcheck arguments will be printed to the
  60. debugger. This way we can identify an offending thread, set breakpoints in it,
  61. and hit go to return to the spinning code to debug it further. Because
  62. KeBugCheckEx() is not called the .bugcheck directive will not return bugcheck
  63. information in this case. The arguments are already printed out to the kernel
  64. debugger. You can also retrieve them from a global variable via
  65. "dd watchdog!g_WdBugCheckData l5" (use dq on NT64).
  66. On MP machines it is possible to hit a timeout when the spinning thread is
  67. interrupted by hardware interrupt and ISR or DPC routine is running at the time
  68. of the bugcheck (this is because the timeout's work item can be delivered and
  69. handled on the second CPU and the same time). If this is the case you will have
  70. to look deeper at the offending thread's stack (e.g. using dds) to determine
  71. spinning code which caused the timeout to occur.
  72. Arguments:
  73. Arg1: fffffa8004374870, Pointer to a stuck thread object. Do .thread then kb on it to find
  74. the hung location.
  75. Arg2: 0000000000000000, Pointer to a DEFERRED_WATCHDOG object.
  76. Arg3: 0000000000000000, Pointer to offending driver name.
  77. Arg4: 0000000000000000, Number of times "intercepted" bugcheck 0xEA was hit (see notes).
  78.  
  79. Debugging Details:
  80. ------------------
  81.  
  82.  
  83. FAULTING_THREAD: fffffa8004374870
  84.  
  85. DEFAULT_BUCKET_ID: GRAPHICS_DRIVER_FAULT
  86.  
  87. CUSTOMER_CRASH_COUNT: 1
  88.  
  89. BUGCHECK_STR: 0xEA
  90.  
  91. PROCESS_NAME: System
  92.  
  93. CURRENT_IRQL: 0
  94.  
  95. ANALYSIS_VERSION: 6.3.9600.17336 (debuggers(dbg).150226-1500) amd64fre
  96.  
  97. LAST_CONTROL_TRANSFER: from fffff88004015f63 to fffff80002a8f640
  98.  
  99. STACK_TEXT:
  100. fffff880`02e302a8 fffff880`04015f63 : 00000000`000000ea fffffa80`04374870 00000000`00000000 00000000`00000000 : nt!KeBugCheckEx
  101. fffff880`02e302b0 fffff880`04016112 : fffff880`02e30388 fffff880`0f0d02c0 fffff880`02e30388 fffff880`02e30450 : dxgkrnl!TdrTimedOperationBugcheckOnTimeout+0x37
  102. fffff880`02e30320 fffff880`0f07c703 : fffffa80`03ad7000 fffff880`02e30481 fffff880`02e30450 fffff880`0f0d02ac : dxgkrnl!TdrTimedOperationDelay+0xbe
  103. fffff880`02e30360 fffffa80`03ad7000 : fffff880`02e30481 fffff880`02e30450 fffff880`0f0d02ac 00000000`01312d00 : atikmdag+0x44703
  104. fffff880`02e30368 fffff880`02e30481 : fffff880`02e30450 fffff880`0f0d02ac 00000000`01312d00 fffff800`03000028 : 0xfffffa80`03ad7000
  105. fffff880`02e30370 fffff880`02e30450 : fffff880`0f0d02ac 00000000`01312d00 fffff800`03000028 fffff880`0f07c6d7 : 0xfffff880`02e30481
  106. fffff880`02e30378 fffff880`0f0d02ac : 00000000`01312d00 fffff800`03000028 fffff880`0f07c6d7 00000000`00000101 : 0xfffff880`02e30450
  107. fffff880`02e30380 00000000`01312d00 : fffff800`03000028 fffff880`0f07c6d7 00000000`00000101 00000000`00000080 : atikmdag+0x982ac
  108. fffff880`02e30388 fffff800`03000028 : fffff880`0f07c6d7 00000000`00000101 00000000`00000080 00000000`00009708 : 0x1312d00
  109. fffff880`02e30390 fffff880`0f07605e : 00000000`00000064 fffff800`03008a7b 00000000`0000000a 00000000`00000063 : hal!HalInitializeProcessor+0x88
  110. fffff880`02e303e0 00000000`00000064 : fffff800`03008a7b 00000000`0000000a 00000000`00000063 fffff880`02e30401 : atikmdag+0x3e05e
  111. fffff880`02e303e8 fffff800`03008a7b : 00000000`0000000a 00000000`00000063 fffff880`02e30401 00000000`00000002 : 0x64
  112. fffff880`02e303f0 fffff880`0f0d01ce : 00000000`00000001 00000000`00000064 fffff880`0f25b4c0 fffffa80`03ad7000 : hal!KeStallExecutionProcessor+0x183
  113. fffff880`02e30420 00000000`00000001 : 00000000`00000064 fffff880`0f25b4c0 fffffa80`03ad7000 fffff880`03600000 : atikmdag+0x981ce
  114. fffff880`02e30428 00000000`00000064 : fffff880`0f25b4c0 fffffa80`03ad7000 fffff880`03600000 00000000`0000ec00 : 0x1
  115. fffff880`02e30430 fffff880`0f25b4c0 : fffffa80`03ad7000 fffff880`03600000 00000000`0000ec00 fffffa80`042ea018 : 0x64
  116. fffff880`02e30438 fffffa80`03ad7000 : fffff880`03600000 00000000`0000ec00 fffffa80`042ea018 ffffffff`0000008c : atikmdag+0x2234c0
  117. fffff880`02e30440 fffff880`03600000 : 00000000`0000ec00 fffffa80`042ea018 ffffffff`0000008c fffffa80`00000000 : 0xfffffa80`03ad7000
  118. fffff880`02e30448 00000000`0000ec00 : fffffa80`042ea018 ffffffff`0000008c fffffa80`00000000 00000000`0000008b : 0xfffff880`03600000
  119. fffff880`02e30450 fffffa80`042ea018 : ffffffff`0000008c fffffa80`00000000 00000000`0000008b 00000009`00000048 : 0xec00
  120. fffff880`02e30458 ffffffff`0000008c : fffffa80`00000000 00000000`0000008b 00000009`00000048 fffff880`0f0d02ac : 0xfffffa80`042ea018
  121. fffff880`02e30460 fffffa80`00000000 : 00000000`0000008b 00000009`00000048 fffff880`0f0d02ac fffff880`02e30450 : 0xffffffff`0000008c
  122. fffff880`02e30468 00000000`0000008b : 00000009`00000048 fffff880`0f0d02ac fffff880`02e30450 00000001`000007d0 : 0xfffffa80`00000000
  123. fffff880`02e30470 00000009`00000048 : fffff880`0f0d02ac fffff880`02e30450 00000001`000007d0 00000000`00000000 : 0x8b
  124. fffff880`02e30478 fffff880`0f0d02ac : fffff880`02e30450 00000001`000007d0 00000000`00000000 00000000`00000000 : 0x00000009`00000048
  125. fffff880`02e30480 fffff880`02e30450 : 00000001`000007d0 00000000`00000000 00000000`00000000 00000000`00000000 : atikmdag+0x982ac
  126. fffff880`02e30488 00000001`000007d0 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0xfffff880`02e30450
  127. fffff880`02e30490 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00000001`000007d0
  128.  
  129.  
  130. STACK_COMMAND: .thread 0xfffffa8004374870 ; kb
  131.  
  132. FOLLOWUP_IP:
  133. dxgkrnl!TdrTimedOperationBugcheckOnTimeout+37
  134. fffff880`04015f63 cc int 3
  135.  
  136. SYMBOL_STACK_INDEX: 1
  137.  
  138. SYMBOL_NAME: dxgkrnl!TdrTimedOperationBugcheckOnTimeout+37
  139.  
  140. FOLLOWUP_NAME: MachineOwner
  141.  
  142. MODULE_NAME: dxgkrnl
  143.  
  144. IMAGE_NAME: dxgkrnl.sys
  145.  
  146. DEBUG_FLR_IMAGE_TIMESTAMP: 4ce799fa
  147.  
  148. IMAGE_VERSION: 6.1.7601.17514
  149.  
  150. FAILURE_BUCKET_ID: X64_0xEA_IMAGE_dxgkrnl.sys
  151.  
  152. BUCKET_ID: X64_0xEA_IMAGE_dxgkrnl.sys
  153.  
  154. ANALYSIS_SOURCE: KM
  155.  
  156. FAILURE_ID_HASH_STRING: km:x64_0xea_image_dxgkrnl.sys
  157.  
  158. FAILURE_ID_HASH: {b58a0dfd-90f3-63cd-1b07-7ce1b53744cb}
  159.  
  160. Followup: MachineOwner
  161. ---------
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement