Microsoft (R) Windows Debugger Version 6.11.0001.404 X86
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [C:\Users\K\Desktop\SevenForum\012410-21450-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
WARNING: Whitespace at end of path element
Symbol search path is: SRV*C:\symbols;*http://msdl.microsoft.com/download/symbols ;srv*e:\symbols
*http://msdl.microsoft.com/download/symbols
Executable search path is:
Windows 7 Kernel Version 7600 MP (2 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS
Built by: 7600.16385.amd64fre.win7_rtm.090713-1255
Machine Name:
Kernel base = 0xfffff800`02a07000 PsLoadedModuleList = 0xfffff800`02c44e50
Debug session time: Sun Jan 24 01:11:47.616 2010 (GMT-4)
System Uptime: 0 days 1:01:21.613
Loading Kernel Symbols
...............................................................
................................................................
..................................
Loading User Symbols
Loading unloaded module list
......
*** ERROR: Symbol file could not be found. Defaulted to export symbols for VIDEOPRT.SYS -
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
Use !analyze -v to get detailed debugging information.
BugCheck 100000EA, {fffffa8004fa6b60, fffffa8004f5d9f0, fffffa8004f59850, 1}
*** ERROR: Module load completed but symbols could not be loaded for vgapnp.sys
Unable to load image \SystemRoot\System32\win32k.sys, Win32 error 0n2
*** WARNING: Unable to verify timestamp for win32k.sys
*** ERROR: Module load completed but symbols could not be loaded for win32k.sys
Probably caused by : vgapnp.sys ( vgapnp+530d )
Followup: MachineOwner
---------
1: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
THREAD_STUCK_IN_DEVICE_DRIVER_M (100000ea)
The device driver is spinning in an infinite loop, most likely waiting for
hardware to become idle. This usually indicates problem with the hardware
itself or with the device driver programming the hardware incorrectly.
If the kernel debugger is connected and running when watchdog detects a
timeout condition then DbgBreakPoint() will be called instead of KeBugCheckEx()
and detailed message including bugcheck arguments will be printed to the
debugger. This way we can identify an offending thread, set breakpoints in it,
and hit go to return to the spinning code to debug it further. Because
KeBugCheckEx() is not called the .bugcheck directive will not return bugcheck
information in this case. The arguments are already printed out to the kernel
debugger. You can also retrieve them from a global variable via
"dd watchdog!g_WdBugCheckData l5" (use dq on NT64).
On MP machines it is possible to hit a timeout when the spinning thread is
interrupted by hardware interrupt and ISR or DPC routine is running at the time
of the bugcheck (this is because the timeout's work item can be delivered and
handled on the second CPU and the same time). If this is the case you will have
to look deeper at the offending thread's stack (e.g. using dds) to determine
spinning code which caused the timeout to occur.
Arguments:
Arg1: fffffa8004fa6b60, Pointer to a stuck thread object. Do .thread then kb on it to find
the hung location.
Arg2: fffffa8004f5d9f0, Pointer to a DEFERRED_WATCHDOG object.
Arg3: fffffa8004f59850, Pointer to offending driver name.
Arg4: 0000000000000001, Number of times "intercepted" bugcheck 0xEA was hit (see notes).
Debugging Details:
------------------
FAULTING_THREAD: fffffa8004fa6b60
DEFAULT_BUCKET_ID: GRAPHICS_DRIVER_FAULT
CUSTOMER_CRASH_COUNT: 1
BUGCHECK_STR: 0xEA
PROCESS_NAME: csrss.exe
CURRENT_IRQL: 1
LAST_CONTROL_TRANSFER: from fffff88001802c54 to fffff80002a78f00
STACK_TEXT:
fffff880`036e9c18 fffff880`01802c54 : 00000000`000000ea fffffa80`04fa6b60 fffffa80`04f5d9f0 fffffa80`04f59850 : nt!KeBugCheckEx
fffff880`036e9c20 fffff800`02a5592f : fffffa80`04fa6b60 fffffa80`04fa6bb0 00000000`0023040c fffffa80`03d9dd80 : VIDEOPRT!VideoPortCompleteDma+0xf04
fffff880`036ea150 fffff800`02a55ce7 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiDeliverApc+0x1d7
fffff880`036ea1d0 fffff800`02ffb9c3 : 00000000`0023040c fffffa80`04fb0500 00000000`00001ed0 fffff800`02ffde3e : nt!KiApcInterrupt+0xd7
fffff880`036ea360 fffff800`02ffc03f : fffff800`0300bf60 00000000`00000001 00000000`00000000 fffff800`02fe4000 : hal!x86BiosWriteIoSpace+0x14b
fffff880`036ea3b0 fffff800`02ffbe30 : fffff800`0300bf60 fffff880`036ea480 fffffa80`034f28f0 fffff880`036ea480 : hal!XmEmulateStream+0x10f
fffff880`036ea3e0 fffff800`02ff51c5 : 00000000`00000000 00000000`0000411b fffffa80`04fb0500 fffff880`036ea4d0 : hal!x86BiosExecuteInterruptShadowed+0xfc
fffff880`036ea410 fffff880`0180c0a7 : 00000000`00000000 fffff880`00000000 fffffa80`04fb0500 00000000`00000000 : hal!x86BiosCall+0x45
fffff880`036ea450 fffff880`03ba030d : 00000000`00000007 fffffa80`047da9a8 00000000`00000000 fffff800`02a7b8cd : VIDEOPRT!VideoPortInt10+0x9f
fffff880`036ea4b0 fffff880`03ba0d81 : fffffa80`034f2920 00000000`00000000 00000000`00000000 00000000`00000000 : vgapnp+0x530d
fffff880`036ea510 fffff880`01817eb3 : fffffa80`034f2a00 fffff880`00000000 00000000`00000000 00000000`00000000 : vgapnp+0x5d81
fffff880`036ea5b0 fffff960`000e4b02 : 00000000`00000004 fffffa80`034f28f0 fffff900`c0083de8 fffffa80`047da9a8 : VIDEOPRT!VideoPortCreateEvent+0x16ab
fffff880`036ea660 00000000`00000004 : fffffa80`034f28f0 fffff900`c0083de8 fffffa80`047da9a8 fffff880`036ea7d0 : win32k+0x14b02
fffff880`036ea668 fffffa80`034f28f0 : fffff900`c0083de8 fffffa80`047da9a8 fffff880`036ea7d0 fffff800`00000004 : 0x4
fffff880`036ea670 fffff900`c0083de8 : fffffa80`047da9a8 fffff880`036ea7d0 fffff800`00000004 fffff880`036ea700 : 0xfffffa80`034f28f0
fffff880`036ea678 fffffa80`047da9a8 : fffff880`036ea7d0 fffff800`00000004 fffff880`036ea700 fffff880`036ea6c0 : 0xfffff900`c0083de8
fffff880`036ea680 fffff880`036ea7d0 : fffff800`00000004 fffff880`036ea700 fffff880`036ea6c0 fffff880`036ea6b0 : 0xfffffa80`047da9a8
fffff880`036ea688 fffff800`00000004 : fffff880`036ea700 fffff880`036ea6c0 fffff880`036ea6b0 00000000`00000000 : 0xfffff880`036ea7d0
fffff880`036ea690 fffff880`036ea700 : fffff880`036ea6c0 fffff880`036ea6b0 00000000`00000000 fffffa80`04f5ca90 : 0xfffff800`00000004
fffff880`036ea698 fffff880`036ea6c0 : fffff880`036ea6b0 00000000`00000000 fffffa80`04f5ca90 fffff800`02ac4793 : 0xfffff880`036ea700
fffff880`036ea6a0 fffff880`036ea6b0 : 00000000`00000000 fffffa80`04f5ca90 fffff800`02ac4793 00000000`02060001 : 0xfffff880`036ea6c0
fffff880`036ea6a8 00000000`00000000 : fffffa80`04f5ca90 fffff800`02ac4793 00000000`02060001 fffff880`036ea6c8 : 0xfffff880`036ea6b0
STACK_COMMAND: .thread 0xfffffa8004fa6b60 ; kb
FOLLOWUP_IP:
vgapnp+530d
fffff880`03ba030d 85c0 test eax,eax
SYMBOL_STACK_INDEX: 9
SYMBOL_NAME: vgapnp+530d
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: vgapnp
IMAGE_NAME: vgapnp.sys
DEBUG_FLR_IMAGE_TIMESTAMP: 4a5bc587
FAILURE_BUCKET_ID: X64_0xEA_IMAGE_vgapnp.sys
BUCKET_ID: X64_0xEA_IMAGE_vgapnp.sys
Followup: MachineOwner
---------