Je viens d'analyser un rapport d'erreur, quelqu'un peut me dire se qui cloche
Microsoft (R) Windows Debugger Version 6.3.9600.17336 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [C:\Users\antoi\Desktop\010517-7000-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
************* Symbol Path validation summary **************
Response Time (ms) Location
Deferred SRV*C:\Windows\symbol_cache*http://msdl.microsoft.com/download/symbols
Symbol search path is: SRV*C:\Windows\symbol_cache*http://msdl.microsoft.com/download/symbols
Executable search path is:
Windows 8 Kernel Version 14393 MP (6 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS Personal
Built by: 14393.576.amd64fre.rs1_release_inmarket.161208-2252
Machine Name:
Kernel base = 0xfffff802`3c809000 PsLoadedModuleList = 0xfffff802`3cb0e060
Debug session time: Thu Jan 5 23:38:07.166 2017 (UTC + 1:00)
System Uptime: 0 days 3:44:47.893
Loading Kernel Symbols
.
Press ctrl-c (cdb, kd, ntsd) or ctrl-break (windbg) to abort symbol loads that take too long.
Run !sym noisy before .reload to track down problems loading symbols.
..............................................................
................................................................
..............................................
Loading User Symbols
Loading unloaded module list
.............
Cannot read PEB32 from WOW64 TEB32 00006d7a - Win32 error 0n30
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
Use !analyze -v to get detailed debugging information.
BugCheck 116, {ffffda804134a4a0, fffff803b9c384e0, ffffffffc000009a, 4}
Unable to load image nvlddmkm.sys, Win32 error 0n2
*** WARNING: Unable to verify timestamp for nvlddmkm.sys
*** ERROR: Module load completed but symbols could not be loaded for nvlddmkm.sys
Probably caused by : nvlddmkm.sys ( nvlddmkm+9684e0 )
Followup: MachineOwner
---------
4: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
VIDEO_TDR_FAILURE (116)
Attempt to reset the display driver and recover from timeout failed.
Arguments:
Arg1: ffffda804134a4a0, Optional pointer to internal TDR recovery context (TDR_RECOVERY_CONTEXT).
Arg2: fffff803b9c384e0, The pointer into responsible device driver module (e.g. owner tag).
Arg3: ffffffffc000009a, Optional error code (NTSTATUS) of the last failed operation.
Arg4: 0000000000000004, Optional internal context dependent data.
Debugging Details:
------------------
DUMP_FILE_ATTRIBUTES: 0x8
Kernel Generated Triage Dump
FAULTING_IP:
nvlddmkm+9684e0
fffff803`b9c384e0 48ff25b945e7ff jmp qword ptr [nvlddmkm+0x7dcaa0 (fffff803`b9aacaa0)]
DEFAULT_BUCKET_ID: GRAPHICS_DRIVER_TDR_FAULT
CUSTOMER_CRASH_COUNT: 1
BUGCHECK_STR: 0x116
PROCESS_NAME: System
CURRENT_IRQL: 0
ANALYSIS_VERSION: 6.3.9600.17336 (debuggers(dbg).150226-1500) amd64fre
STACK_TEXT:
ffffb801`6b746a58 fffff803`b696ba88 : 00000000`00000116 ffffda80`4134a4a0 fffff803`b9c384e0 ffffffff`c000009a : nt!KeBugCheckEx
ffffb801`6b746a60 fffff803`b694e92f : fffff803`b9c384e0 ffffda80`3fcb5bb0 ffffda80`3fcdf010 ffffda80`3fcb5c38 : dxgkrnl!TdrBugcheckOnTimeout+0xec
ffffb801`6b746aa0 fffff803`b694badf : ffffda80`3fcdf010 00000000`ffffffff ffffda80`4134a4a0 ffffda80`4134a4a0 : dxgkrnl!ADAPTER_RENDER::Reset+0x153
ffffb801`6b746ad0 fffff803`b696b275 : fffff802`3cbc0100 00000000`00000000 00000000`00000000 00000000`00000300 : dxgkrnl!DXGADAPTER::Reset+0x307
ffffb801`6b746b20 fffff803`b696b3b7 : 00000000`00000300 fffff802`3cbc6280 ffffda80`3daa74f0 fffff802`3c8929d8 : dxgkrnl!TdrResetFromTimeout+0x15
ffffb801`6b746b50 fffff802`3c8a01b9 : ffffda80`3d37e540 fffff803`b696b390 ffffda80`402f9b70 ffffda80`439ab840 : dxgkrnl!TdrResetFromTimeoutWorkItem+0x27
ffffb801`6b746b80 fffff802`3c80b729 : ffffda80`41037098 00000000`00000080 ffffda80`3c6b26c0 ffffda80`3d37e540 : nt!ExpWorkerThread+0xe9
ffffb801`6b746c10 fffff802`3c958bb6 : ffffb801`638ac180 ffffda80`3d37e540 fffff802`3c80b6e8 00000000`00000000 : nt!PspSystemThreadStartup+0x41
ffffb801`6b746c60 00000000`00000000 : ffffb801`6b747000 ffffb801`6b741000 00000000`00000000 00000000`00000000 : nt!KiStartSystemThread+0x16
STACK_COMMAND: .bugcheck ; kb
FOLLOWUP_IP:
nvlddmkm+9684e0
fffff803`b9c384e0 48ff25b945e7ff jmp qword ptr [nvlddmkm+0x7dcaa0 (fffff803`b9aacaa0)]
SYMBOL_NAME: nvlddmkm+9684e0
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: nvlddmkm
IMAGE_NAME: nvlddmkm.sys
DEBUG_FLR_IMAGE_TIMESTAMP: 584d9744
FAILURE_BUCKET_ID: 0x116_IMAGE_nvlddmkm.sys
BUCKET_ID: 0x116_IMAGE_nvlddmkm.sys
ANALYSIS_SOURCE: KM
FAILURE_ID_HASH_STRING: km:0x116_image_nvlddmkm.sys
FAILURE_ID_HASH: {c89bfe8c-ed39-f658-ef27-f2898997fdbd}
Followup: MachineOwner
---------