Microsoft (R) Windows Debugger Version 6.12.0002.633 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [F:\a\Minidump\D M P\DMP\021511-11934-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
Symbol search path is: SRV*c:\websymbols*http://msdl.microsoft.com/download/symbols
Executable search path is:
Windows 7 Kernel Version 7600 MP (2 procs) Free x86 compatible
Product: WinNt, suite: TerminalServer SingleUserTS
Built by: 7600.16695.x86fre.win7_gdr.101026-1503
Machine Name:
Kernel base = 0x82c52000 PsLoadedModuleList = 0x82d9a810
Debug session time: Tue Feb 15 09:19:48.146 2011 (UTC - 5:00)
System Uptime: 0 days 0:00:17.941
Loading Kernel Symbols
...............................................................
..............................................................
Loading User Symbols
Loading unloaded module list
.....
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
Use !analyze -v to get detailed debugging information.
BugCheck 1000007F, {8, 807c7750, 0, 0}
*** WARNING: Unable to verify timestamp for atikmdag.sys
*** ERROR: Module load completed but symbols could not be loaded for atikmdag.sys
Probably caused by : atikmdag.sys ( atikmdag+280ee )
Followup: MachineOwner
---------
1: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
UNEXPECTED_KERNEL_MODE_TRAP_M (1000007f)
This means a trap occurred in kernel mode, and it's a trap of a kind
that the kernel isn't allowed to have/catch (bound trap) or that
is always instant death (double fault). The first number in the
bugcheck params is the number of the trap (8 = double fault, etc)
Consult an Intel x86 family manual to learn more about what these
traps are. Here is a *portion* of those codes:
If kv shows a taskGate
use .tss on the part before the colon, then kv.
Else if kv shows a trapframe
use .trap on that value
Else
.trap on the appropriate frame will show where the trap was taken
(on x86, this will be the ebp that goes with the procedure KiTrap)
Endif
kb will then show the corrected stack.
Arguments:
Arg1: 00000008, EXCEPTION_DOUBLE_FAULT
Arg2: 807c7750
Arg3: 00000000
Arg4: 00000000
Debugging Details:
------------------
BUGCHECK_STR: 0x7f_8
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT
PROCESS_NAME: csrss.exe
CURRENT_IRQL: 0
LAST_CONTROL_TRANSFER: from 82c35a4e to 82c20bf4
STACK_TEXT:
8ceefffc 82c35a4e 0000001d 000000e1 8cef0010 hal!HalBeginSystemInterrupt+0x2
8ceefffc 82e9a290 0000001d 000000e1 8cef0010 hal!HalpIpiHandler+0xf6
8cef00a0 82e9361a 00010004 00000002 8cef0338 nt!CmpCompareCompressedName+0x4d
8cef00ec 82ea73b1 8cef0140 00000008 8cef0360 nt!CmpKcbCacheLookup+0x1d8
8cef02d8 82e88d91 8c80a170 8cef0398 8cef031c nt!CmpBuildHashStackAndLookupCache+0x2e6
8cef0480 82e7357b 8c80a170 8558b980 86c45200 nt!CmpParseKey+0x36e
8cef04fc 82e99729 00000000 8cef0550 00000240 nt!ObpLookupObjectName+0x4fa
8cef0558 82e90e74 8cef0728 8558b980 8558b900 nt!ObOpenObjectByName+0x165
8cef0638 82e94bec 8cef098c 82000000 8cef0728 nt!CmOpenKey+0x1f4
8cef0658 82c9543a 8cef098c 82000000 8cef0728 nt!NtOpenKey+0x18
8cef0658 82c937dd 8cef098c 82000000 8cef0728 nt!KiFastCallEntry+0x12a
8cef06dc 82e4ab9f 8cef098c 82000000 8cef0728 nt!ZwOpenKey+0x11
8cef095c 82e49df4 80000000 8cef0c9c 00000000 nt!RtlpGetRegistryHandleAndPath+0x224
8cef0bf4 9142a0ee 80000000 8cef0c9c 8cef0c1c nt!RtlQueryRegistryValues+0x59
WARNING: Stack unwind information not available. Following frames may be wrong.
8cef0c54 9142c96f 8cef0c9c 8cef0f1c 8cef1184 atikmdag+0x280ee
8cef0ea0 91422369 8cef1184 8cef0ecc 8cef0ffc atikmdag+0x2a96f
8cef0fd0 9145b934 8692d000 8cef0fe8 916ddfe8 atikmdag+0x20369
8cef0fd4 8692d000 8cef0fe8 916ddfe8 8d5c9040 atikmdag+0x59934
8cef0fd8 8cef0fe8 916ddfe8 8d5c9040 00000040 0x8692d000
8cef0fdc 916ddfe8 8d5c9040 00000040 00010006 0x8cef0fe8
8cef0fe8 00010006 8cef105c 8cef1184 00000000 atikmdag+0x2dbfe8
8cef0fec 8cef105c 8cef1184 00000000 00000004 0x10006
8cef0ff0 8cef1184 00000000 00000004 00000000 0x8cef105c
8cef0ff4 00000000 00000004 00000000 00000000 0x8cef1184
STACK_COMMAND: kb
FOLLOWUP_IP:
atikmdag+280ee
9142a0ee ?? ???
SYMBOL_STACK_INDEX: e
SYMBOL_NAME: atikmdag+280ee
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: atikmdag
IMAGE_NAME: atikmdag.sys
DEBUG_FLR_IMAGE_TIMESTAMP: 4ac57b8c
FAILURE_BUCKET_ID: 0x7f_8_atikmdag+280ee
BUCKET_ID: 0x7f_8_atikmdag+280ee
Followup: MachineOwner
---------