Chciałem zaznaczyć że odinstalowałem sterowniki do karty graficznej i teraz są 2x jakiesstandardowe BGA z wykrzynikami w menadżerze, nie moge teraz sterowników znaleźć
odczytane z symbolami plik dmp
Microsoft ® Windows Debugger Version 6.11.0001.404 X86
Copyright © Microsoft Corporation. All rights reserved.
Loading Dump File [C:\Users\Masters\Desktop\Mini111613-05.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
Symbol search path is: SRV*c:\symbols*
http://msdl.microsoft.com/download/symbolsExecutable search path is:
Windows Server 2008/Windows Vista Kernel Version 6002 (Service Pack 2) MP (2 procs) Free x86 compatible
Product: WinNt, suite: TerminalServer SingleUserTS Personal
Built by: 6002.18881.x86fre.vistasp2_gdr.130707-1535
Machine Name:
Kernel base = 0x83e46000 PsLoadedModuleList = 0x83f5dc70
Debug session time: Sat Nov 16 19:36:31.810 2013 (GMT+1)
System Uptime: 0 days 0:04:25.919
Loading Kernel Symbols
...............................................................
................................................................
.......................
Loading User Symbols
Loading unloaded module list
...
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
Use !analyze -v to get detailed debugging information.
BugCheck 100000EA, {864a6868, 0, 0, 0}
Unable to load image \SystemRoot\system32\DRIVERS\atipmdag.sys, Win32 error 0n2
*** WARNING: Unable to verify timestamp for atipmdag.sys
*** ERROR: Module load completed but symbols could not be loaded for atipmdag.sys
*** WARNING: Unable to verify timestamp for atikmpag.sys
*** ERROR: Module load completed but symbols could not be loaded for atikmpag.sys
Probably caused by : dxgkrnl.sys ( dxgkrnl!TdrTimedOperationBugcheckOnTimeout+2c )
Followup: MachineOwner
---------
0: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
THREAD_STUCK_IN_DEVICE_DRIVER_M (100000ea)
The device driver is spinning in an infinite loop, most likely waiting for
hardware to become idle. This usually indicates problem with the hardware
itself or with the device driver programming the hardware incorrectly.
If the kernel debugger is connected and running when watchdog detects a
timeout condition then DbgBreakPoint() will be called instead of KeBugCheckEx()
and detailed message including bugcheck arguments will be printed to the
debugger. This way we can identify an offending thread, set breakpoints in it,
and hit go to return to the spinning code to debug it further. Because
KeBugCheckEx() is not called the .bugcheck directive will not return bugcheck
information in this case. The arguments are already printed out to the kernel
debugger. You can also retrieve them from a global variable via
"dd watchdog!g_WdBugCheckData l5" (use dq on NT64).
On MP machines it is possible to hit a timeout when the spinning thread is
interrupted by hardware interrupt and ISR or DPC routine is running at the time
of the bugcheck (this is because the timeout's work item can be delivered and
handled on the second CPU and the same time). If this is the case you will have
to look deeper at the offending thread's stack (e.g. using dds) to determine
spinning code which caused the timeout to occur.
Arguments:
Arg1: 864a6868, Pointer to a stuck thread object. Do .thread then kb on it to find
the hung location.
Arg2: 00000000, Pointer to a DEFERRED_WATCHDOG object.
Arg3: 00000000, Pointer to offending driver name.
Arg4: 00000000, Number of times "intercepted" bugcheck 0xEA was hit (see notes).
Debugging Details:
------------------
FAULTING_THREAD: 864a6868
DEFAULT_BUCKET_ID: GRAPHICS_DRIVER_FAULT
CUSTOMER_CRASH_COUNT: 5
BUGCHECK_STR: 0xEA
PROCESS_NAME: Skype.exe
CURRENT_IRQL: 0
LAST_CONTROL_TRANSFER: from 8fb2de38 to 83f139bd
STACK_TEXT:
832b67b4 8fb2de38 000000ea 864a6868 00000000 nt!KeBugCheckEx+0x1e
832b67f8 8fb26391 832b6844 00000000 8fb253e7 dxgkrnl!TdrTimedOperationBugcheckOnTimeout+0x2c
832b6820 8f62bd38 832b6844 00000000 00000000 dxgkrnl!TdrTimedOperationDelay+0xc9
WARNING: Stack unwind information not available. Following frames may be wrong.
832b6870 8f625d60 8f7c3f7c 832b6924 00000bb8 atipmdag+0x27d38
832b6890 8f7caa87 87c38001 832b68a8 000001c6 atipmdag+0x21d60
832b68e8 8f7d4404 92bbf810 8f7c3f7c 832b6924 atipmdag+0x1c6a87
832b6938 8f7d45fc 00009c40 00007530 832b6978 atipmdag+0x1d0404
832b6948 8f7d47ff 00009c40 00007530 00000000 atipmdag+0x1d05fc
832b6978 8f7d4c1b 832b69d0 00000001 92bbf900 atipmdag+0x1d07ff
832b6990 8f7c1e34 92bbf810 00000001 832b69d0 atipmdag+0x1d0c1b
832b69b4 8f608ced 92bbf810 00000001 832b69d0 atipmdag+0x1bde34
832b6ae0 8f793db1 919c32e8 919c3268 832b6bec atipmdag+0x4ced
832b6b10 8f784b93 832b6b4c 832b6b4c 832b6b30 atipmdag+0x18fdb1
832b6b20 8f7744cf 832b6b4c 91ff2000 832b6b78 atipmdag+0x180b93
832b6b30 8f7741c6 832b6b4c 00000052 832b6bec atipmdag+0x1704cf
832b6b78 8f614dba 832b6bec 832b6bac 89562063 atipmdag+0x1701c6
832b6b84 89562063 866da888 832b6bec 00000000 atipmdag+0x10dba
832b6bac 8fb519ac 00d21d08 832b6bec 00000000 atikmpag+0x2063
832b6bcc 8fb51553 90d21d08 832b6bec 0c980e3b dxgkrnl!DXGADAPTER::DdiCreateContext+0x36
832b6c60 8fb51c28 abebc190 00000040 06abf208 dxgkrnl!DXGCONTEXT::Initialize+0x9c
832b6c84 8fb53634 832b6d14 00000002 00000001 dxgkrnl!DXGDEVICE::CreateContext+0xbc
832b6d58 83e90c96 06abf130 06abf168 76ec5d14 dxgkrnl!DxgkCreateContext+0x395
832b6d58 76ec5d14 06abf130 06abf168 76ec5d14 nt!KiSystemServicePostCall
06abf168 00000000 00000000 00000000 00000000 0x76ec5d14
STACK_COMMAND: .thread 0xffffffff864a6868 ; kb
FOLLOWUP_IP:
dxgkrnl!TdrTimedOperationBugcheckOnTimeout+2c
8fb2de38 cc int 3
SYMBOL_STACK_INDEX: 1
SYMBOL_NAME: dxgkrnl!TdrTimedOperationBugcheckOnTimeout+2c
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: dxgkrnl
IMAGE_NAME: dxgkrnl.sys
DEBUG_FLR_IMAGE_TIMESTAMP: 51f9ba78
FAILURE_BUCKET_ID: 0xEA_IMAGE_dxgkrnl.sys
BUCKET_ID: 0xEA_IMAGE_dxgkrnl.sys
Followup: MachineOwner
---------
Użytkownik pawel315 edytował ten post 19 11 2013 - 19:06