使用DEbugg tools 查看信息如下:
WARNING: Inaccessible path: 'SRVC:\Symbolshttp://msdl.microsoft.com/download/symbols' Microsoft (R) Windows Debugger Version 6.12.0002.633 AMD64 Copyright (c) Microsoft Corporation. All rights reserved. Loading Dump File [C:\Windows\Minidump\121423-7859-01.dmp] Mini Kernel Dump File: Only registers and stack trace are available WARNING: Inaccessible path: 'SRVC:\Symbolshttp://msdl.microsoft.com/download/symbols' Symbol search path is: SRVC:\Symbolshttp://msdl.microsoft.com/download/symbols;SRV*C:\Symbols*http://msdl.microsoft.com/download/symbols Executable search path is: Windows 7 Kernel Version 22621 MP (16 procs) Free x64 Product: WinNt, suite: TerminalServer SingleUserTS Machine Name: Kernel base = 0xfffff8032c400000 PsLoadedModuleList = 0xfffff803
2d0134a0 Debug session time: Thu Dec 14 20:04:15.629 2023 (UTC + 8:00) System Uptime: 0 days 0:44:27.338 Loading Kernel Symbols ............................................................... ................................................................ ................................................................ ............... Loading User Symbols Loading unloaded module list ....... Cannot read PEB32 from WOW64 TEB32 00015600 - Win32 error 0n30 ******************************************************************************* * * * Bugcheck Analysis * * * ******************************************************************************* Use !analyze -v to get detailed debugging information. BugCheck 116, {ffff8201235e8460, fffff80351916730, ffffffffc000009a, 4} Unable to load image nvlddmkm.sys, Win32 error 0n2 *** WARNING: Unable to verify timestamp for nvlddmkm.sys *** ERROR: Module load completed but symbols could not be loaded for nvlddmkm.sys Probably caused by : Unknown_Image ( PAGE_NOT_ZERO ) Followup: MachineOwner --------- *** Memory manager detected 87552 instance(s) of page corruption, target is likely to have memory corruption. 0: kd> !analyze -v ******************************************************************************* * * * Bugcheck Analysis * * * ******************************************************************************* VIDEO_TDR_FAILURE (116) Attempt to reset the display driver and recover from timeout failed. Arguments: Arg1: ffff8201235e8460, Optional pointer to internal TDR recovery context (TDR_RECOVERY_CONTEXT). Arg2: fffff80351916730, The pointer into responsible device driver module (e.g. owner tag). Arg3: ffffffffc000009a, Optional error code (NTSTATUS) of the last failed operation. Arg4: 0000000000000004, Optional internal context dependent data. Debugging Details: ------------------ OVERLAPPED_MODULE: Address regions for 'srv2' and 'dump_storpor' overlap FAULTING_IP: nvlddmkm+10f6730 fffff80351916730 488b058967b4ff mov rax,qword ptr [nvlddmkm+0xc3cec0 (fffff803
5145cec0)] DEFAULT_BUCKET_ID: GRAPHICS_DRIVER_TDR_FAULT CUSTOMER_CRASH_COUNT: 1 BUGCHECK_STR: 0x116 PROCESS_NAME: System CURRENT_IRQL: 0 BAD_PAGES_DETECTED: 15600 STACK_TEXT: fffffa8248baf828 fffff803
3cf11a5e : 0000000000000116 ffff8201
235e8460 fffff80351916730 ffffffff
c000009a : nt!KeBugCheckEx fffffa8248baf830 fffff803
3cec18b2 : fffff80351916730 ffff8201
1ed61820 0000000000000080 ffff8201
1ed618e0 : dxgkrnl!TdrBugcheckOnTimeout+0xfe fffffa8248baf870 00000000
00000000 : 0000000000000000 00000000
00000000 0000000000000000 00000000
00000000 : dxgkrnl!ADAPTER_RENDER::Reset+0x12a STACK_COMMAND: kb SYMBOL_NAME: PAGE_NOT_ZERO FOLLOWUP_NAME: MachineOwner MODULE_NAME: Unknown_Module IMAGE_NAME: Unknown_Image DEBUG_FLR_IMAGE_TIMESTAMP: 0 BUCKET_ID: PAGE_NOT_ZERO Followup: MachineOwner --------- *** Memory manager detected 87552 instance(s) of page corruption, target is likely to have memory corruption. 0: kd> !analyze -v ******************************************************************************* * * * Bugcheck Analysis * * * ******************************************************************************* VIDEO_TDR_FAILURE (116) Attempt to reset the display driver and recover from timeout failed. Arguments: Arg1: ffff8201235e8460, Optional pointer to internal TDR recovery context (TDR_RECOVERY_CONTEXT). Arg2: fffff80351916730, The pointer into responsible device driver module (e.g. owner tag). Arg3: ffffffffc000009a, Optional error code (NTSTATUS) of the last failed operation. Arg4: 0000000000000004, Optional internal context dependent data. Debugging Details: ------------------ OVERLAPPED_MODULE: Address regions for 'srv2' and 'dump_storpor' overlap FAULTING_IP: nvlddmkm+10f6730 fffff80351916730 488b058967b4ff mov rax,qword ptr [nvlddmkm+0xc3cec0 (fffff803
5145cec0)] DEFAULT_BUCKET_ID: GRAPHICS_DRIVER_TDR_FAULT CUSTOMER_CRASH_COUNT: 1 BUGCHECK_STR: 0x116 PROCESS_NAME: System CURRENT_IRQL: 0 BAD_PAGES_DETECTED: 15600 STACK_TEXT: fffffa8248baf828 fffff803
3cf11a5e : 0000000000000116 ffff8201
235e8460 fffff80351916730 ffffffff
c000009a : nt!KeBugCheckEx fffffa8248baf830 fffff803
3cec18b2 : fffff80351916730 ffff8201
1ed61820 0000000000000080 ffff8201
1ed618e0 : dxgkrnl!TdrBugcheckOnTimeout+0xfe fffffa8248baf870 00000000
00000000 : 0000000000000000 00000000
00000000 0000000000000000 00000000
00000000 : dxgkrnl!ADAPTER_RENDER::Reset+0x12a STACK_COMMAND: kb SYMBOL_NAME: PAGE_NOT_ZERO FOLLOWUP_NAME: MachineOwner MODULE_NAME: Unknown_Module IMAGE_NAME: Unknown_Image DEBUG_FLR_IMAGE_TIMESTAMP: 0 BUCKET_ID: PAGE_NOT_ZERO Followup: MachineOwner --------- *** Memory manager detected 87552 instance(s) of page corruption, target is likely to have memory corruption. 0: kd> !analyze -v ******************************************************************************* * * * Bugcheck Analysis * * * ******************************************************************************* VIDEO_TDR_FAILURE (116) Attempt to reset the display driver and recover from timeout failed. Arguments: Arg1: ffff8201235e8460, Optional pointer to internal TDR recovery context (TDR_RECOVERY_CONTEXT). Arg2: fffff80351916730, The pointer into responsible device driver module (e.g. owner tag). Arg3: ffffffffc000009a, Optional error code (NTSTATUS) of the last failed operation. Arg4: 0000000000000004, Optional internal context dependent data. Debugging Details: ------------------ OVERLAPPED_MODULE: Address regions for 'srv2' and 'dump_storpor' overlap FAULTING_IP: nvlddmkm+10f6730 fffff80351916730 488b058967b4ff mov rax,qword ptr [nvlddmkm+0xc3cec0 (fffff803
5145cec0)] DEFAULT_BUCKET_ID: GRAPHICS_DRIVER_TDR_FAULT CUSTOMER_CRASH_COUNT: 1 BUGCHECK_STR: 0x116 PROCESS_NAME: System CURRENT_IRQL: 0 BAD_PAGES_DETECTED: 15600 STACK_TEXT: fffffa8248baf828 fffff803
3cf11a5e : 0000000000000116 ffff8201
235e8460 fffff80351916730 ffffffff
c000009a : nt!KeBugCheckEx fffffa8248baf830 fffff803
3cec18b2 : fffff80351916730 ffff8201
1ed61820 0000000000000080 ffff8201
1ed618e0 : dxgkrnl!TdrBugcheckOnTimeout+0xfe fffffa8248baf870 00000000
00000000 : 0000000000000000 00000000
00000000 0000000000000000 00000000
00000000 : dxgkrnl!ADAPTER_RENDER::Reset+0x12a STACK_COMMAND: kb SYMBOL_NAME: PAGE_NOT_ZERO FOLLOWUP_NAME: MachineOwner MODULE_NAME: Unknown_Module IMAGE_NAME: Unknown_Image DEBUG_FLR_IMAGE_TIMESTAMP: 0 BUCKET_ID: PAGE_NOT_ZERO Followup: MachineOwner --------- *** Memory manager detected 87552 instance(s) of page corruption, target is likely to have memory corruption. 0: kd> !analyze -v ******************************************************************************* * * * Bugcheck Analysis * * * ******************************************************************************* VIDEO_TDR_FAILURE (116) Attempt to reset the display driver and recover from timeout failed. Arguments: Arg1: ffff8201235e8460, Optional pointer to internal TDR recovery context (TDR_RECOVERY_CONTEXT). Arg2: fffff80351916730, The pointer into responsible device driver module (e.g. owner tag). Arg3: ffffffffc000009a, Optional error code (NTSTATUS) of the last failed operation. Arg4: 0000000000000004, Optional internal context dependent data. Debugging Details: ------------------ OVERLAPPED_MODULE: Address regions for 'srv2' and 'dump_storpor' overlap FAULTING_IP: nvlddmkm+10f6730 fffff80351916730 488b058967b4ff mov rax,qword ptr [nvlddmkm+0xc3cec0 (fffff803
5145cec0)] DEFAULT_BUCKET_ID: GRAPHICS_DRIVER_TDR_FAULT CUSTOMER_CRASH_COUNT: 1 BUGCHECK_STR: 0x116 PROCESS_NAME: System CURRENT_IRQL: 0 BAD_PAGES_DETECTED: 15600 STACK_TEXT: fffffa8248baf828 fffff803
3cf11a5e : 0000000000000116 ffff8201
235e8460 fffff80351916730 ffffffff
c000009a : nt!KeBugCheckEx fffffa8248baf830 fffff803
3cec18b2 : fffff80351916730 ffff8201
1ed61820 0000000000000080 ffff8201
1ed618e0 : dxgkrnl!TdrBugcheckOnTimeout+0xfe fffffa8248baf870 00000000
00000000 : 0000000000000000 00000000
00000000 0000000000000000 00000000
00000000 : dxgkrnl!ADAPTER_RENDER::Reset+0x12a STACK_COMMAND: kb SYMBOL_NAME: PAGE_NOT_ZERO FOLLOWUP_NAME: MachineOwner MODULE_NAME: Unknown_Module IMAGE_NAME: Unknown_Image DEBUG_FLR_IMAGE_TIMESTAMP: 0 BUCKET_ID: PAGE_NOT_ZERO Followup: MachineOwner --------- *** Memory manager detected 87552 instance(s) of page corruption, target is likely to have memory corruption. 0: kd> !analyze -v ******************************************************************************* * * * Bugcheck Analysis * * * ******************************************************************************* VIDEO_TDR_FAILURE (116) Attempt to reset the display driver and recover from timeout failed. Arguments: Arg1: ffff8201235e8460, Optional pointer to internal TDR recovery context (TDR_RECOVERY_CONTEXT). Arg2: fffff80351916730, The pointer into responsible device driver module (e.g. owner tag). Arg3: ffffffffc000009a, Optional error code (NTSTATUS) of the last failed operation. Arg4: 0000000000000004, Optional internal context dependent data. Debugging Details: ------------------ OVERLAPPED_MODULE: Address regions for 'srv2' and 'dump_storpor' overlap FAULTING_IP: nvlddmkm+10f6730 fffff80351916730 488b058967b4ff mov rax,qword ptr [nvlddmkm+0xc3cec0 (fffff803
5145cec0)] DEFAULT_BUCKET_ID: GRAPHICS_DRIVER_TDR_FAULT CUSTOMER_CRASH_COUNT: 1 BUGCHECK_STR: 0x116 PROCESS_NAME: System CURRENT_IRQL: 0 BAD_PAGES_DETECTED: 15600 STACK_TEXT: fffffa8248baf828 fffff803
3cf11a5e : 0000000000000116 ffff8201
235e8460 fffff80351916730 ffffffff
c000009a : nt!KeBugCheckEx fffffa8248baf830 fffff803
3cec18b2 : fffff80351916730 ffff8201
1ed61820 0000000000000080 ffff8201
1ed618e0 : dxgkrnl!TdrBugcheckOnTimeout+0xfe fffffa8248baf870 00000000
00000000 : 0000000000000000 00000000
00000000 0000000000000000 00000000
00000000 : dxgkrnl!ADAPTER_RENDER::Reset+0x12a STACK_COMMAND: kb SYMBOL_NAME: PAGE_NOT_ZERO FOLLOWUP_NAME: MachineOwner MODULE_NAME: Unknown_Module IMAGE_NAME: Unknown_Image DEBUG_FLR_IMAGE_TIMESTAMP: 0 BUCKET_ID: PAGE_NOT_ZERO Followup: MachineOwner --------- *** Memory manager detected 87552 instance(s) of page corruption, target is likely to have memory corruption.