Microsoft (R) Windows Debugger Version 6.11.0001.404 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [C:\Users\FUBAR-RC1-Desktop\Downloads\dump\Minidump\051909-26937-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
Symbol search path is: SRV*c:\symbols*
Symbol information
Executable search path is:
Unable to load image \SystemRoot\system32\ntoskrnl.exe, Win32 error 0n2
*** WARNING: Unable to verify timestamp for ntoskrnl.exe
*** ERROR: Module load completed but symbols could not be loaded for ntoskrnl.exe
Windows 7 Kernel Version 7127 MP (2 procs) Free x86 compatible
Product: WinNt, suite: TerminalServer SingleUserTS
Built by: 7127.0.x86fre.winmain.090507-1820
Machine Name:
Kernel base = 0x82840000 PsLoadedModuleList = 0x8297f570
Debug session time: Tue May 19 19:25:31.270 2009 (GMT-4)
System Uptime: 0 days 0:48:04.146
Unable to load image \SystemRoot\system32\ntoskrnl.exe, Win32 error 0n2
*** WARNING: Unable to verify timestamp for ntoskrnl.exe
*** ERROR: Module load completed but symbols could not be loaded for ntoskrnl.exe
Loading Kernel Symbols
...............................................................
................................................................
.................
Loading User Symbols
Loading unloaded module list
................
1: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
THREAD_STUCK_IN_DEVICE_DRIVER_M (100000ea)
The device driver is spinning in an infinite loop, most likely waiting for
hardware to become idle. This usually indicates problem with the hardware
itself or with the device driver programming the hardware incorrectly.
If the kernel debugger is connected and running when watchdog detects a
timeout condition then DbgBreakPoint() will be called instead of KeBugCheckEx()
and detailed message including bugcheck arguments will be printed to the
debugger. This way we can identify an offending thread, set breakpoints in it,
and hit go to return to the spinning code to debug it further. Because
KeBugCheckEx() is not called the .bugcheck directive will not return bugcheck
information in this case. The arguments are already printed out to the kernel
debugger. You can also retrieve them from a global variable via
"dd watchdog!g_WdBugCheckData l5" (use dq on NT64).
On MP machines it is possible to hit a timeout when the spinning thread is
interrupted by hardware interrupt and ISR or DPC routine is running at the time
of the bugcheck (this is because the timeout's work item can be delivered and
handled on the second CPU and the same time). If this is the case you will have
to look deeper at the offending thread's stack (e.g. using dds) to determine
spinning code which caused the timeout to occur.
Arguments:
Arg1: 86743d48, Pointer to a stuck thread object. Do .thread then kb on it to find
the hung location.
Arg2: 00000000, Pointer to a DEFERRED_WATCHDOG object.
Arg3: 00000000, Pointer to offending driver name.
Arg4: 00000000, Number of times "intercepted" bugcheck 0xEA was hit (see notes).
Debugging Details:
------------------
*** WARNING: Unable to verify timestamp for atikmdag.sys
*** ERROR: Module load completed but symbols could not be loaded for atikmdag.sys
*** WARNING: Unable to verify timestamp for dxgmms1.sys
*** ERROR: Module load completed but symbols could not be loaded for dxgmms1.sys
***** Kernel symbols are WRONG. Please fix symbols to do analysis.
*************REMOVED ERROR MESSAGE STUFF FROM HERE - usasma
ADDITIONAL_DEBUG_TEXT:
Use '!findthebuild' command to search for the target build information.
If the build information is available, run '!findthebuild -s ; .reload' to set symbol path and load symbols.
MODULE_NAME: dxgkrnl
FAULTING_MODULE: 82840000 nt
DEBUG_FLR_IMAGE_TIMESTAMP: 4a03bbea
FAULTING_THREAD: 86743d48
DEFAULT_BUCKET_ID: GRAPHICS_DRIVER_FAULT
CUSTOMER_CRASH_COUNT: 1
BUGCHECK_STR: 0xEA
CURRENT_IRQL: 0
LAST_CONTROL_TRANSFER: from 91c9842b to 828fbf28
STACK_TEXT:
WARNING: Stack unwind information not available. Following frames may be wrong.
a2edb948 91c9842b 000000ea 86743d48 00000000 nt+0xbbf28
a2edb98c 91c912a6 a2edb9d8 00000000 91c8c099 dxgkrnl+0x1242b
a2edb9b4 8d434a21 a2edb9d8 00000000 00000000 dxgkrnl+0xb2a6
a2edba04 8d42ec0a 8d53900f a2edba9c 00000bb8 atikmdag+0x27a21
a2edba24 8d540e45 86ccd001 a2edba3c 85d55140 atikmdag+0x21c0a
a2edba7c 8d53928f 85d55008 8d53900f a2edba9c atikmdag+0x133e45
a2edbaac 8d545d61 85d55008 00000004 00000000 atikmdag+0x12c28f
a2edbadc 8d5478f9 00000000 85d55008 85d55140 atikmdag+0x138d61
a2edbb04 8d54033c 00100403 00000000 86489010 atikmdag+0x13a8f9
a2edbb20 8d536ae5 85d55008 a2edbb40 8d4105f1 atikmdag+0x13333c
a2edbb2c 8d4105f1 85d55008 84eb79c0 00000000 atikmdag+0x129ae5
a2edbb40 8d41b194 00000000 c0000001 84eb79c0 atikmdag+0x35f1
a2edbb70 8d41c259 86c16000 86c16000 8280e6ee atikmdag+0xe194
a2edbb84 91d0785a 00000000 86d84510 86c16000 atikmdag+0xf259
a2edbba8 91d0779b 85d11788 86d84510 00000000 dxgkrnl+0x8185a
a2edbbd0 91d07570 86d84510 86d84510 8bf3007e dxgkrnl+0x8179b
a2edbbec 91d4392c 00000000 00000000 a2edbcb0 dxgkrnl+0x81570
a2edbc64 91d6acd9 fffffcfb 0002cd0e 00000000 dxgmms1+0x692c
a2edbc90 91d4a993 85d11788 a2edbcb0 00000102 dxgmms1+0x2dcd9
a2edbd28 91d6f4b7 00000000 82879d54 85d11788 dxgmms1+0xd993
a2edbd3c 91d6f573 85d11788 00000000 86743d48 dxgmms1+0x324b7
a2edbd50 82a17121 85d11788 e063d57a 00000000 dxgmms1+0x32573
a2edbd90 828bad99 91d6f4f4 85d11788 00000000 nt+0x1d7121
00000000 00000000 00000000 00000000 00000000 nt+0x7ad99
STACK_COMMAND: .thread 0xffffffff86743d48 ; kb
FOLLOWUP_IP:
dxgkrnl+1242b
91c9842b ?? ???
SYMBOL_STACK_INDEX: 1
SYMBOL_NAME: dxgkrnl+1242b
FOLLOWUP_NAME: MachineOwner
IMAGE_NAME: dxgkrnl.sys
BUCKET_ID: WRONG_SYMBOLS
Followup: MachineOwner
---------
1: kd> .thread
Implicit thread is now 86743d48
1: kd> kb
ChildEBP RetAddr Args to Child
WARNING: Stack unwind information not available. Following frames may be wrong.
a2edb948 91c9842b 000000ea 86743d48 00000000 nt+0xbbf28
a2edb98c 91c912a6 a2edb9d8 00000000 91c8c099 dxgkrnl+0x1242b
a2edb9b4 8d434a21 a2edb9d8 00000000 00000000 dxgkrnl+0xb2a6
a2edba04 8d42ec0a 8d53900f a2edba9c 00000bb8 atikmdag+0x27a21
a2edba24 8d540e45 86ccd001 a2edba3c 85d55140 atikmdag+0x21c0a
a2edba7c 8d53928f 85d55008 8d53900f a2edba9c atikmdag+0x133e45
a2edbaac 8d545d61 85d55008 00000004 00000000 atikmdag+0x12c28f
a2edbadc 8d5478f9 00000000 85d55008 85d55140 atikmdag+0x138d61
a2edbb04 8d54033c 00100403 00000000 86489010 atikmdag+0x13a8f9
a2edbb20 8d536ae5 85d55008 a2edbb40 8d4105f1 atikmdag+0x13333c
a2edbb2c 8d4105f1 85d55008 84eb79c0 00000000 atikmdag+0x129ae5
a2edbb40 8d41b194 00000000 c0000001 84eb79c0 atikmdag+0x35f1
a2edbb70 8d41c259 86c16000 86c16000 8280e6ee atikmdag+0xe194
a2edbb84 91d0785a 00000000 86d84510 86c16000 atikmdag+0xf259
a2edbba8 91d0779b 85d11788 86d84510 00000000 dxgkrnl+0x8185a
a2edbbd0 91d07570 86d84510 86d84510 8bf3007e dxgkrnl+0x8179b
a2edbbec 91d4392c 00000000 00000000 a2edbcb0 dxgkrnl+0x81570
a2edbc64 91d6acd9 fffffcfb 0002cd0e 00000000 dxgmms1+0x692c
a2edbc90 91d4a993 85d11788 a2edbcb0 00000102 dxgmms1+0x2dcd9
a2edbd28 91d6f4b7 00000000 82879d54 85d11788 dxgmms1+0xd993