Microsoft (R) Windows Debugger Version 6.12.0002.633 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [C:\Windows\MEMORY.DMP]
Kernel Summary Dump File: Only kernel address space is available
Symbol search path is: SRV*C:\symbols*
http://msdl.microsoft.com/download/symbols
Executable search path is:
Windows 7 Kernel Version 7601 (Service Pack 1) MP (4 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS
Built by: 7601.17790.amd64fre.win7sp1_gdr.120305-1505
Machine Name:
Kernel base = 0xfffff800`02a4d000 PsLoadedModuleList = 0xfffff800`02c91650
Debug session time: Thu Apr 12 19:15:21.328 2012 (UTC + 2:00)
System Uptime: 0 days 2:52:09.169
Loading Kernel Symbols
...............................................................
................................................................
.............................
Loading User Symbols
Loading unloaded module list
..........
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
Use !analyze -v to get detailed debugging information.
BugCheck EA, {fffffa80036ee680, 0, 0, 0}
*** ERROR: Module load completed but symbols could not be loaded for atikmdag.sys
Probably caused by : dxgkrnl.sys ( dxgkrnl!TdrTimedOperationBugcheckOnTimeout+37 )
Followup: MachineOwner
---------
2: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
THREAD_STUCK_IN_DEVICE_DRIVER (ea)
The device driver is spinning in an infinite loop, most likely waiting for
hardware to become idle. This usually indicates problem with the hardware
itself or with the device driver programming the hardware incorrectly.
If the kernel debugger is connected and running when watchdog detects a
timeout condition then DbgBreakPoint() will be called instead of KeBugCheckEx()
and detailed message including bugcheck arguments will be printed to the
debugger. This way we can identify an offending thread, set breakpoints in it,
and hit go to return to the spinning code to debug it further. Because
KeBugCheckEx() is not called the .bugcheck directive will not return bugcheck
information in this case. The arguments are already printed out to the kernel
debugger. You can also retrieve them from a global variable via
"dd watchdog!g_WdBugCheckData l5" (use dq on NT64).
On MP machines (OS builds <= 3790) it is possible to hit a timeout when the spinning thread is
interrupted by hardware interrupt and ISR or DPC routine is running at the time
of the bugcheck (this is because the timeout's work item can be delivered and
handled on the second CPU and the same time). If this is the case you will have
to look deeper at the offending thread's stack (e.g. using dds) to determine
spinning code which caused the timeout to occur.
Arguments:
Arg1: fffffa80036ee680, Pointer to a stuck thread object. Do .thread then kb on it to find
the hung location.
Arg2: 0000000000000000, Pointer to a DEFERRED_WATCHDOG object.
Arg3: 0000000000000000, Pointer to offending driver name.
Arg4: 0000000000000000, Number of times this error occurred. If a debugger is attached,
this error is not always fatal -- see DESCRIPTION below. On the
blue screen, this will always equal 1.
Debugging Details:
------------------
FAULTING_THREAD: fffffa80036ee680
DEFAULT_BUCKET_ID: GRAPHICS_DRIVER_FAULT
BUGCHECK_STR: 0xEA
PROCESS_NAME: System
CURRENT_IRQL: 0
LAST_CONTROL_TRANSFER: from fffff88007651f63 to fffff80002ac9c80
STACK_TEXT:
fffff880`039bd398 fffff880`07651f63 : 00000000`000000ea fffffa80`036ee680 00000000`00000000 00000000`00000000 : nt!KeBugCheckEx
fffff880`039bd3a0 fffff880`07652112 : fffff880`039bd470 fffff880`07cea707 fffff880`039bd470 00000000`80000000 : dxgkrnl!TdrTimedOperationBugcheckOnTimeout+0x37
fffff880`039bd410 fffff880`07abc532 : 00000000`00000000 fffff880`07cea6ec fffff880`039bd590 00000000`01c9c380 : dxgkrnl!TdrTimedOperationDelay+0xbe
fffff880`039bd450 fffff880`07ab465c : 00000000`01c9c380 fffffa80`05347010 fffff880`039bd590 00000000`00000bb8 : atikmdag+0x30532
fffff880`039bd4c0 fffff880`07cf5e9a : fffff880`039bd580 fffff800`02ac7ebd 00000000`00000008 fffff880`07fbcad8 : atikmdag+0x2865c
fffff880`039bd4f0 fffff880`07cedb07 : fffffa80`05596760 00000000`00000001 00000000`00000000 00000000`00000001 : atikmdag+0x269e9a
fffff880`039bd570 fffff880`07ce74e5 : fffffa80`053883c0 00000000`00000000 fffff880`07fbcad8 00000000`0000000a : atikmdag+0x261b07
fffff880`039bd5c0 fffff880`07a8d5fa : fffffa80`07590a00 fffffa80`05376040 fffffa80`05371160 fffffa80`07590b28 : atikmdag+0x25b4e5
fffff880`039bd5f0 fffff880`07fbcb1c : fffffa80`053883c0 fffffa80`07590a10 fffffa80`053884b0 00000000`00000018 : atikmdag+0x15fa
fffff880`039bd670 fffff880`076d9be3 : fffffa80`053883c0 fffffa80`05376040 fffffa80`07590a10 fffffa80`05376040 : atikmdag+0x530b1c
fffff880`039bd6a0 fffff880`076d0cc1 : 00000000`00000000 00000000`00000000 fffffa80`05376040 fffffa80`00000100 : dxgkrnl!DpiDxgkDdiRemoveDevice+0x33
fffff880`039bd6d0 fffff880`076cf7ad : 00000000`00000002 fffffa80`07590a10 fffffa80`05376190 fffff8a0`01552890 : dxgkrnl!DpiFdoHandleRemoveDevice+0x2b9
fffff880`039bd720 fffff880`076cceb0 : 00000000`00000000 fffffa80`05376040 00000000`00000000 fffffa80`07590a10 : dxgkrnl!DpiFdoDispatchPnp+0x51
fffff880`039bd760 fffff800`02d33ad9 : fffff8a0`01552890 fffffa80`05376040 00000000`c00000bb fffff880`039bd868 : dxgkrnl!DpiDispatchPnp+0xc8
fffff880`039bd7b0 fffff800`02eb2101 : fffffa80`040c3a10 00000000`00000000 fffffa80`040c26e0 00000000`00000801 : nt!IopSynchronousCall+0xc5
fffff880`039bd820 fffff800`02bc5753 : fffff8a0`125a3840 fffff8a0`125a3840 00000000`00000018 00000000`00000000 : nt!IopRemoveDevice+0x101
fffff880`039bd8e0 fffff800`02eb1c54 : fffffa80`040c26e0 00000000`00000000 00000000`00000002 00000000`00000000 : nt!PnpRemoveLockedDeviceNode+0x1a3
fffff880`039bd930 fffff800`02eb1d60 : 00000000`00000000 fffffa80`040c3a00 fffff8a0`03b2a220 fffff800`02cc7a60 : nt!PnpDeleteLockedDeviceNode+0x44
fffff880`039bd960 fffff800`02eb1e59 : fffffa80`03817802 fffffa80`03817810 00000000`00000001 00000000`00000000 : nt!PnpDeleteLockedDeviceNodes+0xa0
fffff880`039bd9d0 fffff800`02eb1fd1 : fffffa80`03817810 00000000`00000000 fffffa80`03817810 00000000`00000002 : nt!PnpDelayedRemoveWorker+0x79
fffff880`039bda20 fffff800`02bc5979 : 00000000`00000001 fffffa80`0576f228 00000000`00000001 00000000`00000001 : nt!PnpChainDereferenceComplete+0x131
fffff880`039bda60 fffff800`02f42ff0 : 00000000`00000000 fffffa80`040c2600 fffff8a0`03916e90 00000000`00000001 : nt!PnpIsChainDereferenced+0xc9
fffff880`039bdae0 fffff800`02f4328c : fffff880`039bdcb8 00000000`00000000 fffff8a0`1264f200 fffffa80`00000000 : nt!PnpProcessQueryRemoveAndEject+0xff0
fffff880`039bdc20 fffff800`02e2c52e : 00000000`00000000 fffffa80`06c15c10 fffff8a0`02e6d4f0 00000000`00000001 : nt!PnpProcessTargetDeviceEvent+0x4c
fffff880`039bdc50 fffff800`02ad3361 : fffff800`02d32978 fffff8a0`03916e90 fffff800`02c692b8 fffff800`02c786a0 : nt! ?? ::NNGAKEGL::`string'+0x5ab7b
fffff880`039bdcb0 fffff800`02d63fda : 00000000`00000000 fffffa80`036ee680 00000000`00000080 fffffa80`036dc040 : nt!ExpWorkerThread+0x111
fffff880`039bdd40 fffff800`02aba9c6 : fffff880`03763180 fffffa80`036ee680 fffff880`0376dfc0 00000000`00000000 : nt!PspSystemThreadStartup+0x5a
fffff880`039bdd80 00000000`00000000 : fffff880`039be000 fffff880`039b8000 fffff880`039bd0e0 00000000`00000000 : nt!KxStartSystemThread+0x16
STACK_COMMAND: .thread 0xfffffa80036ee680 ; kb
FOLLOWUP_IP:
dxgkrnl!TdrTimedOperationBugcheckOnTimeout+37
fffff880`07651f63 cc int 3
SYMBOL_STACK_INDEX: 1
SYMBOL_NAME: dxgkrnl!TdrTimedOperationBugcheckOnTimeout+37
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: dxgkrnl
IMAGE_NAME: dxgkrnl.sys
DEBUG_FLR_IMAGE_TIMESTAMP: 4ce799fa
FAILURE_BUCKET_ID: X64_0xEA_IMAGE_dxgkrnl.sys
BUCKET_ID: X64_0xEA_IMAGE_dxgkrnl.sys
Followup: MachineOwner
---------
2: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
THREAD_STUCK_IN_DEVICE_DRIVER (ea)
The device driver is spinning in an infinite loop, most likely waiting for
hardware to become idle. This usually indicates problem with the hardware
itself or with the device driver programming the hardware incorrectly.
If the kernel debugger is connected and running when watchdog detects a
timeout condition then DbgBreakPoint() will be called instead of KeBugCheckEx()
and detailed message including bugcheck arguments will be printed to the
debugger. This way we can identify an offending thread, set breakpoints in it,
and hit go to return to the spinning code to debug it further. Because
KeBugCheckEx() is not called the .bugcheck directive will not return bugcheck
information in this case. The arguments are already printed out to the kernel
debugger. You can also retrieve them from a global variable via
"dd watchdog!g_WdBugCheckData l5" (use dq on NT64).
On MP machines (OS builds <= 3790) it is possible to hit a timeout when the spinning thread is
interrupted by hardware interrupt and ISR or DPC routine is running at the time
of the bugcheck (this is because the timeout's work item can be delivered and
handled on the second CPU and the same time). If this is the case you will have
to look deeper at the offending thread's stack (e.g. using dds) to determine
spinning code which caused the timeout to occur.
Arguments:
Arg1: fffffa80036ee680, Pointer to a stuck thread object. Do .thread then kb on it to find
the hung location.
Arg2: 0000000000000000, Pointer to a DEFERRED_WATCHDOG object.
Arg3: 0000000000000000, Pointer to offending driver name.
Arg4: 0000000000000000, Number of times this error occurred. If a debugger is attached,
this error is not always fatal -- see DESCRIPTION below. On the
blue screen, this will always equal 1.
Debugging Details:
------------------
FAULTING_THREAD: fffffa80036ee680
DEFAULT_BUCKET_ID: GRAPHICS_DRIVER_FAULT
BUGCHECK_STR: 0xEA
PROCESS_NAME: System
CURRENT_IRQL: 0
LAST_CONTROL_TRANSFER: from fffff88007651f63 to fffff80002ac9c80
STACK_TEXT:
fffff880`039bd398 fffff880`07651f63 : 00000000`000000ea fffffa80`036ee680 00000000`00000000 00000000`00000000 : nt!KeBugCheckEx
fffff880`039bd3a0 fffff880`07652112 : fffff880`039bd470 fffff880`07cea707 fffff880`039bd470 00000000`80000000 : dxgkrnl!TdrTimedOperationBugcheckOnTimeout+0x37
fffff880`039bd410 fffff880`07abc532 : 00000000`00000000 fffff880`07cea6ec fffff880`039bd590 00000000`01c9c380 : dxgkrnl!TdrTimedOperationDelay+0xbe
fffff880`039bd450 fffff880`07ab465c : 00000000`01c9c380 fffffa80`05347010 fffff880`039bd590 00000000`00000bb8 : atikmdag+0x30532
fffff880`039bd4c0 fffff880`07cf5e9a : fffff880`039bd580 fffff800`02ac7ebd 00000000`00000008 fffff880`07fbcad8 : atikmdag+0x2865c
fffff880`039bd4f0 fffff880`07cedb07 : fffffa80`05596760 00000000`00000001 00000000`00000000 00000000`00000001 : atikmdag+0x269e9a
fffff880`039bd570 fffff880`07ce74e5 : fffffa80`053883c0 00000000`00000000 fffff880`07fbcad8 00000000`0000000a : atikmdag+0x261b07
fffff880`039bd5c0 fffff880`07a8d5fa : fffffa80`07590a00 fffffa80`05376040 fffffa80`05371160 fffffa80`07590b28 : atikmdag+0x25b4e5
fffff880`039bd5f0 fffff880`07fbcb1c : fffffa80`053883c0 fffffa80`07590a10 fffffa80`053884b0 00000000`00000018 : atikmdag+0x15fa
fffff880`039bd670 fffff880`076d9be3 : fffffa80`053883c0 fffffa80`05376040 fffffa80`07590a10 fffffa80`05376040 : atikmdag+0x530b1c
fffff880`039bd6a0 fffff880`076d0cc1 : 00000000`00000000 00000000`00000000 fffffa80`05376040 fffffa80`00000100 : dxgkrnl!DpiDxgkDdiRemoveDevice+0x33
fffff880`039bd6d0 fffff880`076cf7ad : 00000000`00000002 fffffa80`07590a10 fffffa80`05376190 fffff8a0`01552890 : dxgkrnl!DpiFdoHandleRemoveDevice+0x2b9
fffff880`039bd720 fffff880`076cceb0 : 00000000`00000000 fffffa80`05376040 00000000`00000000 fffffa80`07590a10 : dxgkrnl!DpiFdoDispatchPnp+0x51
fffff880`039bd760 fffff800`02d33ad9 : fffff8a0`01552890 fffffa80`05376040 00000000`c00000bb fffff880`039bd868 : dxgkrnl!DpiDispatchPnp+0xc8
fffff880`039bd7b0 fffff800`02eb2101 : fffffa80`040c3a10 00000000`00000000 fffffa80`040c26e0 00000000`00000801 : nt!IopSynchronousCall+0xc5
fffff880`039bd820 fffff800`02bc5753 : fffff8a0`125a3840 fffff8a0`125a3840 00000000`00000018 00000000`00000000 : nt!IopRemoveDevice+0x101
fffff880`039bd8e0 fffff800`02eb1c54 : fffffa80`040c26e0 00000000`00000000 00000000`00000002 00000000`00000000 : nt!PnpRemoveLockedDeviceNode+0x1a3
fffff880`039bd930 fffff800`02eb1d60 : 00000000`00000000 fffffa80`040c3a00 fffff8a0`03b2a220 fffff800`02cc7a60 : nt!PnpDeleteLockedDeviceNode+0x44
fffff880`039bd960 fffff800`02eb1e59 : fffffa80`03817802 fffffa80`03817810 00000000`00000001 00000000`00000000 : nt!PnpDeleteLockedDeviceNodes+0xa0
fffff880`039bd9d0 fffff800`02eb1fd1 : fffffa80`03817810 00000000`00000000 fffffa80`03817810 00000000`00000002 : nt!PnpDelayedRemoveWorker+0x79
fffff880`039bda20 fffff800`02bc5979 : 00000000`00000001 fffffa80`0576f228 00000000`00000001 00000000`00000001 : nt!PnpChainDereferenceComplete+0x131
fffff880`039bda60 fffff800`02f42ff0 : 00000000`00000000 fffffa80`040c2600 fffff8a0`03916e90 00000000`00000001 : nt!PnpIsChainDereferenced+0xc9
fffff880`039bdae0 fffff800`02f4328c : fffff880`039bdcb8 00000000`00000000 fffff8a0`1264f200 fffffa80`00000000 : nt!PnpProcessQueryRemoveAndEject+0xff0
fffff880`039bdc20 fffff800`02e2c52e : 00000000`00000000 fffffa80`06c15c10 fffff8a0`02e6d4f0 00000000`00000001 : nt!PnpProcessTargetDeviceEvent+0x4c
fffff880`039bdc50 fffff800`02ad3361 : fffff800`02d32978 fffff8a0`03916e90 fffff800`02c692b8 fffff800`02c786a0 : nt! ?? ::NNGAKEGL::`string'+0x5ab7b
fffff880`039bdcb0 fffff800`02d63fda : 00000000`00000000 fffffa80`036ee680 00000000`00000080 fffffa80`036dc040 : nt!ExpWorkerThread+0x111
fffff880`039bdd40 fffff800`02aba9c6 : fffff880`03763180 fffffa80`036ee680 fffff880`0376dfc0 00000000`00000000 : nt!PspSystemThreadStartup+0x5a
fffff880`039bdd80 00000000`00000000 : fffff880`039be000 fffff880`039b8000 fffff880`039bd0e0 00000000`00000000 : nt!KxStartSystemThread+0x16
STACK_COMMAND: .thread 0xfffffa80036ee680 ; kb
FOLLOWUP_IP:
dxgkrnl!TdrTimedOperationBugcheckOnTimeout+37
fffff880`07651f63 cc int 3
SYMBOL_STACK_INDEX: 1
SYMBOL_NAME: dxgkrnl!TdrTimedOperationBugcheckOnTimeout+37
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: dxgkrnl
IMAGE_NAME: dxgkrnl.sys
DEBUG_FLR_IMAGE_TIMESTAMP: 4ce799fa
FAILURE_BUCKET_ID: X64_0xEA_IMAGE_dxgkrnl.sys
BUCKET_ID: X64_0xEA_IMAGE_dxgkrnl.sys
Followup: MachineOwner
---------