2: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
THREAD_STUCK_IN_DEVICE_DRIVER_M (100000ea)
The device driver is spinning in an infinite loop, most likely waiting for
hardware to become idle. This usually indicates problem with the hardware
itself or with the device driver programming the hardware incorrectly.
If the kernel debugger is connected and running when watchdog detects a
timeout condition then DbgBreakPoint() will be called instead of KeBugCheckEx()
and detailed message including BugCheck arguments will be printed to the
debugger. This way we can identify an offending thread, set breakpoints in it,
and hit go to return to the spinning code to debug it further. Because
KeBugCheckEx() is not called the .BugCheck directive will not return BugCheck
information in this case. The arguments are already printed out to the kernel
debugger. You can also retrieve them from a global variable via
"dd watchdog!g_WdBugCheckData l5" (use dq on NT64).
On MP machines it is possible to hit a timeout when the spinning thread is
interrupted by hardware interrupt and ISR or DPC routine is running at the time
of the BugCheck (this is because the timeout's work item can be delivered and
handled on the second CPU and the same time). If this is the case you will have
to look deeper at the offending thread's stack (e.g. using dds) to determine
spinning code which caused the timeout to occur.
Arguments:
Arg1: ffffe0018bbf1380, Pointer to a stuck thread object. Do .thread then kb on it to find
the hung location.
Arg2: 0000000000000000, Pointer to a DEFERRED_WATCHDOG object.
Arg3: 0000000000000000, Pointer to offending driver name.
Arg4: 0000000000000000, Number of times "intercepted" BugCheck 0xEA was hit (see notes).
Debugging Details:
------------------
*** WARNING: Unable to verify timestamp for atikmdag.sys
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 6937
Key : Analysis.DebugAnalysisManager
Value: Create
Key : Analysis.Elapsed.mSec
Value: 20172
Key : Analysis.Init.CPU.mSec
Value: 4577
Key : Analysis.Init.Elapsed.mSec
Value: 8393
Key : Analysis.Memory.CommitPeak.Mb
Value: 69
Key : WER.OS.Branch
Value: th1_st1
Key : WER.OS.Timestamp
Value: 2015-07-17T17:19:00Z
Key : WER.OS.Version
Value: 10.0.10240.16393
BUGCHECK_CODE: ea
BUGCHECK_P1: ffffe0018bbf1380
BUGCHECK_P2: 0
BUGCHECK_P3: 0
BUGCHECK_P4: 0
FAULTING_THREAD: ffffe0018bbf1380
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: System
STACK_TEXT:
ffffd000`e05a2d98 fffff801`a592e15c : 00000000`000000ea ffffe001`8bbf1380 00000000`00000000 00000000`00000000 : nt!KeBugCheckEx
ffffd000`e05a2da0 fffff801`a592e21e : ffffd000`e05a2e78 fffff801`a96282c0 ffffd000`e05a2e78 ffffd000`e05a2f40 : dxgkrnl!TdrTimedOperationBugcheckOnTimeout+0x24
ffffd000`e05a2e10 fffff801`a95d4703 : ffffe001`88e00000 ffffd000`e05a2f71 ffffd000`e05a2f40 fffff801`a96282ac : dxgkrnl!TdrTimedOperationDelay+0xbe
ffffd000`e05a2e50 ffffe001`88e00000 : ffffd000`e05a2f71 ffffd000`e05a2f40 fffff801`a96282ac 00000000`01312d00 : atikmdag+0x44703
ffffd000`e05a2e58 ffffd000`e05a2f71 : ffffd000`e05a2f40 fffff801`a96282ac 00000000`01312d00 00000000`00000028 : 0xffffe001`88e00000
ffffd000`e05a2e60 ffffd000`e05a2f40 : fffff801`a96282ac 00000000`01312d00 00000000`00000028 fffff801`a95d46d7 : 0xffffd000`e05a2f71
ffffd000`e05a2e68 fffff801`a96282ac : 00000000`01312d00 00000000`00000028 fffff801`a95d46d7 00000000`00000101 : 0xffffd000`e05a2f40
ffffd000`e05a2e70 00000000`01312d00 : 00000000`00000028 fffff801`a95d46d7 00000000`00000101 00000000`00000080 : atikmdag+0x982ac
ffffd000`e05a2e78 00000000`00000028 : fffff801`a95d46d7 00000000`00000101 00000000`00000080 00000000`030bdaea : 0x1312d00
ffffd000`e05a2e80 fffff801`a95d46d7 : 00000000`00000101 00000000`00000080 00000000`030bdaea ffff2141`f6e01e49 : 0x28
ffffd000`e05a2e88 00000000`00000101 : 00000000`00000080 00000000`030bdaea ffff2141`f6e01e49 00000000`00000000 : atikmdag+0x446d7
ffffd000`e05a2e90 00000000`00000080 : 00000000`030bdaea ffff2141`f6e01e49 00000000`00000000 00000000`00000001 : 0x101
ffffd000`e05a2e98 00000000`030bdaea : ffff2141`f6e01e49 00000000`00000000 00000000`00000001 ffffe001`88e00000 : 0x80
ffffd000`e05a2ea0 ffff2141`f6e01e49 : 00000000`00000000 00000000`00000001 ffffe001`88e00000 ffffd000`e05a2f60 : 0x30bdaea
ffffd000`e05a2ea8 00000000`00000000 : 00000000`00000001 ffffe001`88e00000 ffffd000`e05a2f60 fffff801`a95ce05e : 0xffff2141`f6e01e49
STACK_COMMAND: .thread 0xffffe0018bbf1380 ; kb
SYMBOL_NAME: dxgkrnl!TdrTimedOperationBugcheckOnTimeout+24
MODULE_NAME: dxgkrnl
IMAGE_NAME: dxgkrnl.sys
IMAGE_VERSION: 10.0.10240.16397
FAILURE_BUCKET_ID: 0xEA_IMAGE_dxgkrnl.sys
OS_VERSION: 10.0.10240.16393
BUILDLAB_STR: th1_st1
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {ea458ad2-d5ab-aa6c-7a11-54653c70dfb8}
Followup: MachineOwner
---------