simpel1970, das ist leider der PC von meinem Bruder (GTS450) ich habe eine 4870 Vapor-X
habe auch extra noch kein 2ten thread eröffnet da ich auf hilfe im sammelthread hoffte
ah jetzt gings glaub ich
Microsoft (R) Windows Debugger Version 6.11.0001.404 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [C:\Windows\LiveKernelReports\WATCHDOG\WD-20110120-1617.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
Symbol search path is: SRV*C:\symbols*
http://msdl.microsoft.com/download/symbols
Executable search path is:
Windows 7 Kernel Version 7600 MP (2 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS
Built by: 7600.16617.amd64fre.win7_gdr.100618-1621
Machine Name:
Kernel base = 0xfffff800`02e5f000 PsLoadedModuleList = 0xfffff800`0309ce50
Debug session time: Thu Jan 20 16:17:20.551 2011 (GMT+1)
System Uptime: 0 days 2:38:40.253
Loading Kernel Symbols
...............................................................
................................................................
.........................
Loading User Symbols
Mini Kernel Dump does not contain unloaded driver list
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
Use !analyze -v to get detailed debugging information.
VIDEO_TDR_TIMEOUT_DETECTED (117)
The display driver failed to respond in timely fashion.
(This code can never be used for real bugcheck).
Arguments:
Arg1: fffffa80046844e0, Optional pointer to internal TDR recovery context (TDR_RECOVERY_CONTEXT).
Arg2: fffff8800419b008, The pointer into responsible device driver module (e.g owner tag).
Arg3: 0000000000000000, The secondary driver specific bucketing key.
Arg4: 0000000000000000, Optional internal context dependent data.
Debugging Details:
------------------
!analyze -v
FAULTING_IP:
atikmpag+7008
fffff880`0419b008 ?? ???
DEFAULT_BUCKET_ID: GRAPHICS_DRIVER_TDR_TIMEOUT
TAG_NOT_DEFINED_202b: *** Unknown TAG in analysis list 202b
BUGCHECK_STR: 0x117
PROCESS_NAME: System
CURRENT_IRQL: 0
STACK_TEXT:
fffff880`023395f0 fffff880`052b74ef : fffffa80`046844e0 fffff880`05303c4f fffffa80`046844e0 fffff880`05285807 : watchdog!WdDbgReportRecreate+0xa3
fffff880`02339b10 fffff880`052b81b4 : fffff8a0`0cbfe430 fffff8a0`0cbfe430 00000000`00000080 fffffa80`046844e0 : dxgkrnl!TdrUpdateDbgReport+0xcb
fffff880`02339b60 fffff880`0528c6b3 : 00000000`00000001 fffffa80`05cef000 00000000`00000000 fffff880`000000da : dxgkrnl!TdrCollectDbgInfoStage2+0x220
fffff880`02339b90 fffff880`052b8d07 : 00000000`00000000 ffffffff`fffe7960 fffffa80`046844e0 fffff880`05387dc0 : dxgkrnl!DXGADAPTER::Reset+0xef
fffff880`02339c40 fffff880`05387ec1 : fffffa80`04874d50 00000000`00000080 00000000`00000000 fffffa80`05ce6010 : dxgkrnl!TdrResetFromTimeout+0x23
fffff880`02339cc0 fffff800`03173c06 : 00000000`0263eb88 fffffa80`05ce98c0 fffffa80`03cd0b30 fffffa80`05ce98c0 : dxgmms1!VidSchiWorkerThread+0x101
fffff880`02339d00 fffff800`02eadc26 : fffff880`009e9180 fffffa80`05ce98c0 fffff880`009f3f40 fffff880`0145aa90 : nt!PspSystemThreadStartup+0x5a
fffff880`02339d40 00000000`00000000 : fffff880`0233a000 fffff880`02334000 fffff880`06143b20 00000000`00000000 : nt!KxStartSystemThread+0x16
STACK_COMMAND: .bugcheck ; kb
FOLLOWUP_IP:
atikmpag+7008
fffff880`0419b008 ?? ???
SYMBOL_NAME: atikmpag+7008
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: atikmpag
IMAGE_NAME: atikmpag.sys
DEBUG_FLR_IMAGE_TIMESTAMP: 4cef188f
FAILURE_BUCKET_ID: X64_0x117_IMAGE_atikmpag.sys
BUCKET_ID: X64_0x117_IMAGE_atikmpag.sys
Followup: MachineOwner
---------
Bluescreen trittt nur in 2D Modus auf
*hinzugefügt*
+
+
+
+
+
+
+
+
Microsoft (R) Windows Debugger Version 6.11.0001.404 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [C:\Windows\Minidump\012111-18033-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
Symbol search path is: SRV*C:\symbols*
http://msdl.microsoft.com/download/symbols
Executable search path is:
Windows 7 Kernel Version 7600 MP (2 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS
Built by: 7600.16617.amd64fre.win7_gdr.100618-1621
Machine Name:
Kernel base = 0xfffff800`02e1f000 PsLoadedModuleList = 0xfffff800`0305ce50
Debug session time: Fri Jan 21 03:39:49.963 2011 (GMT+1)
System Uptime: 0 days 9:32:29.540
Loading Kernel Symbols
...............................................................
................................................................
.........................
Loading User Symbols
Loading unloaded module list
.........
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
Use !analyze -v to get detailed debugging information.
BugCheck 1000007E, {ffffffffc0000005, fffff8000318294f, fffff880031f5a08, fffff880031f5270}
Probably caused by : ntkrnlmp.exe ( nt!CmpDelayDerefKCBWorker+73 )
Followup: MachineOwner
---------
0: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
SYSTEM_THREAD_EXCEPTION_NOT_HANDLED_M (1000007e)
This is a very common bugcheck. Usually the exception address pinpoints
the driver/function that caused the problem. Always note this address
as well as the link date of the driver/image that contains this address.
Some common problems are exception code 0x80000003. This means a hard
coded breakpoint or assertion was hit, but this system was booted
/NODEBUG. This is not supposed to happen as developers should never have
hardcoded breakpoints in retail code, but ...
If this happens, make sure a debugger gets connected, and the
system is booted /DEBUG. This will let us see why this breakpoint is
happening.
Arguments:
Arg1: ffffffffc0000005, The exception code that was not handled
Arg2: fffff8000318294f, The address that the exception occurred at
Arg3: fffff880031f5a08, Exception Record Address
Arg4: fffff880031f5270, Context Record Address
Debugging Details:
------------------
EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - Die Anweisung in 0x%08lx verweist auf Speicher 0x%08lx. Der Vorgang %s konnte nicht im Speicher durchgef hrt werden.
FAULTING_IP:
nt!CmpDelayDerefKCBWorker+73
fffff800`0318294f 4c896808 mov qword ptr [rax+8],r13
EXCEPTION_RECORD: fffff880031f5a08 -- (.exr 0xfffff880031f5a08)
ExceptionAddress: fffff8000318294f (nt!CmpDelayDerefKCBWorker+0x0000000000000073)
ExceptionCode: c0000005 (Access violation)
ExceptionFlags: 00000000
NumberParameters: 2
Parameter[0]: 0000000000000000
Parameter[1]: ffffffffffffffff
Attempt to read from address ffffffffffffffff
CONTEXT: fffff880031f5270 -- (.cxr 0xfffff880031f5270)
rax=ff142111ff0b180a rbx=fffffa8003d06b60 rcx=fffff8a00a38da20
rdx=0000000000000264 rsi=fffff8a002605010 rdi=fffff8a00a38d948
rip=fffff8000318294f rsp=fffff880031f5c40 rbp=0000000000000001
r8=fffff8a002c01320 r9=fffff8a002605010 r10=fffffa8003d06b60
r11=fffffa8003d06b60 r12=fffff80003094ee0 r13=fffff80003094f40
r14=0000000000000000 r15=0000000000000001
iopl=0 nv up ei pl nz na pe nc
cs=0010 ss=0018 ds=002b es=002b fs=0053 gs=002b efl=00010202
nt!CmpDelayDerefKCBWorker+0x73:
fffff800`0318294f 4c896808 mov qword ptr [rax+8],r13 ds:002b:ff142111`ff0b1812=????????????????
Resetting default scope
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT
PROCESS_NAME: System
CURRENT_IRQL: 0
ERROR_CODE: (NTSTATUS) 0xc0000005 - Die Anweisung in 0x%08lx verweist auf Speicher 0x%08lx. Der Vorgang %s konnte nicht im Speicher durchgef hrt werden.
EXCEPTION_PARAMETER1: 0000000000000000
EXCEPTION_PARAMETER2: ffffffffffffffff
READ_ADDRESS: GetPointerFromAddress: unable to read from fffff800030c70e0
ffffffffffffffff
FOLLOWUP_IP:
nt!CmpDelayDerefKCBWorker+73
fffff800`0318294f 4c896808 mov qword ptr [rax+8],r13
BUGCHECK_STR: 0x7E
LAST_CONTROL_TRANSFER: from fffff80002e9c961 to fffff8000318294f
STACK_TEXT:
fffff880`031f5c40 fffff800`02e9c961 : fffff800`031828dc fffff800`030345f8 fffffa80`03d06b60 00000000`00000000 : nt!CmpDelayDerefKCBWorker+0x73
fffff880`031f5c70 fffff800`03133c06 : 00000000`00000000 fffffa80`03d06b60 00000000`00000080 fffffa80`03cf1b30 : nt!ExpWorkerThread+0x111
fffff880`031f5d00 fffff800`02e6dc26 : fffff880`009e9180 fffffa80`03d06b60 fffff880`009f3f40 ff7fffff`ffffffff : nt!PspSystemThreadStartup+0x5a
fffff880`031f5d40 00000000`00000000 : fffff880`031f6000 fffff880`031f0000 fffff880`031f59b0 00000000`00000000 : nt!KxStartSystemThread+0x16
SYMBOL_STACK_INDEX: 0
SYMBOL_NAME: nt!CmpDelayDerefKCBWorker+73
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: nt
IMAGE_NAME: ntkrnlmp.exe
DEBUG_FLR_IMAGE_TIMESTAMP: 4c1c44a9
STACK_COMMAND: .cxr 0xfffff880031f5270 ; kb
FAILURE_BUCKET_ID: X64_0x7E_nt!CmpDelayDerefKCBWorker+73
BUCKET_ID: X64_0x7E_nt!CmpDelayDerefKCBWorker+73
Followup: MachineOwner