日韩性视频-久久久蜜桃-www中文字幕-在线中文字幕av-亚洲欧美一区二区三区四区-撸久久-香蕉视频一区-久久无码精品丰满人妻-国产高潮av-激情福利社-日韩av网址大全-国产精品久久999-日本五十路在线-性欧美在线-久久99精品波多结衣一区-男女午夜免费视频-黑人极品ⅴideos精品欧美棵-人人妻人人澡人人爽精品欧美一区-日韩一区在线看-欧美a级在线免费观看

歡迎訪問 生活随笔!

生活随笔

當前位置: 首頁 > 编程语言 > python >内容正文

python

python launcher卸载后蓝屏_使用dump文件分析系统蓝屏原因

發(fā)布時間:2023/12/9 python 33 豆豆
生活随笔 收集整理的這篇文章主要介紹了 python launcher卸载后蓝屏_使用dump文件分析系统蓝屏原因 小編覺得挺不錯的,現(xiàn)在分享給大家,幫大家做個參考.

當系統(tǒng)崩潰在藍屏瞬間,系統(tǒng)會形成一個擴展名為dmp的存儲器轉(zhuǎn)儲文件,默認存儲位置為C:\WINDOWS\Minidmp。

A.右擊“我的電腦”選擇“屬性”,在“系統(tǒng)屬性”對話框中選擇“高級”

B.在“啟動和故障恢復”中選擇“設(shè)置”,具體設(shè)置如下圖所示

什么是windebug

windebug是微軟發(fā)布的一款相當優(yōu)秀的源碼級(source-level)調(diào)試工具,可以用于Kernel模式調(diào)試和用戶模式調(diào)試,還可以調(diào)試Dump文件。

最新版安裝方法(此方法為在線安裝)

B.安裝netFramework2.0

C.運行1中下載的winsdk_web.exe

的symbol符號文件的路徑配置

為windebug設(shè)置symbol路徑可以提高對dump文件分析的準確性,給我們更多有價值的錯誤信息。

A.在http://msdn.microsoft.com/en-us/windows/hardware/gg463028.aspx根據(jù)實際需要下載相應的版本

B.安裝下載的symbol符號文件

詳細代碼如下

Loading Dump File [C:\Documents and Settings\test-pc\桌面\dump文件\Mini102011-01.dmp]

Mini Kernel Dump File: Only registers and stack trace are available

Symbol search path is: C:\WINDOWS\Symbols;SRV*C:\Windows\symbols*http://msdl.microsoft.com/download/symbols

Executable search path is:

Windows XP Kernel Version 2600 (Service Pack 3) MP (4 procs) Free x86 compatible

Product: WinNt, suite: TerminalServer SingleUserTS

Built by: 2600.xpsp_sp3_gdr.101209-1647

Machine Name:

Kernel base = 0x804d8000 PsLoadedModuleList = 0x8055e720

Debug session time: Thu Oct 20 14:37:16.343 2011 (UTC + 8:00)

System Uptime: 0 days 0:00:43.312

Loading Kernel Symbols

...............................................................

..........................................

Loading User Symbols

Loading unloaded module list

....

*** WARNING: Unable to verify timestamp for nv4_disp.dll

*** ERROR: Module load completed but symbols could not be loaded for nv4_disp.dll

*******************************************************************************

**

*Bugcheck Analysis*

**

*******************************************************************************

Use !analyze -v to get detailed debugging information.

BugCheck 100000EA, {88a18908, 88ced810, b84fbcbc, 1}

ERROR - could not read driver name for bugcheck parameter 3

Probably caused by : nv4_disp.dll ( nv4_disp+28526 )

Followup: MachineOwner

---------

3: kd> !analyze -v

*******************************************************************************

**

*Bugcheck Analysis*

**

*******************************************************************************

THREAD_STUCK_IN_DEVICE_DRIVER_M (100000ea)

The device driver is spinning in an infinite loop, most likely waiting for

hardware to become idle. This usually indicates problem with the hardware

itself or with the device driver programming the hardware incorrectly.

If the kernel debugger is connected and running when watchdog detects a

timeout condition then DbgBreakPoint() will be called instead of KeBugCheckEx()

and detailed message including bugcheck arguments will be printed to the

debugger. This way we can identify an offending thread, set breakpoints in it,

and hit go to return to the spinning code to debug it further. Because

KeBugCheckEx() is not called the .bugcheck directive will not return bugcheck

information in this case. The arguments are already printed out to the kernel

debugger. You can also retrieve them from a global variable via

"dd watchdog!g_WdBugCheckData l5" (use dq on NT64).

On MP machines it is possible to hit a timeout when the spinning thread is

interrupted by hardware interrupt and ISR or DPC routine is running at the time

of the bugcheck (this is because the timeout's work item can be delivered and

handled on the second CPU and the same time). If this is the case you will have

to look deeper at the offending thread's stack (e.g. using dds) to determine

spinning code which caused the timeout to occur.

Arguments:

Arg1: 88a18908, Pointer to a stuck thread object.Do .thread then kb on it to find

the hung location.

Arg2: 88ced810, Pointer to a DEFERRED_WATCHDOG object.

Arg3: b84fbcbc, Pointer to offending driver name.

Arg4: 00000001, Number of times "intercepted" bugcheck 0xEA was hit (see notes).

Debugging Details:

------------------

ERROR - could not read driver name for bugcheck parameter 3

FAULTING_THREAD:88a18908

FAULTING_IP:

nv4_disp+28526

bd03a526 ?????

IMAGE_NAME:nv4_disp.dll

DEBUG_FLR_IMAGE_TIMESTAMP:4bb7e5d1

MODULE_NAME:nv4_disp

FAULTING_MODULE: bd012000 nv4_disp

DEFAULT_BUCKET_ID:GRAPHICS_DRIVER_FAULT

CUSTOMER_CRASH_COUNT:1

BUGCHECK_STR:0xEA

PROCESS_NAME:csrss.exe

LAST_CONTROL_TRANSFER:from e3a33010 to bd03a526

STACK_TEXT:

WARNING: Stack unwind information not available. Following frames may be wrong.

b816758c e3a33010 e3a33010 e3a33010 00000080 nv4_disp+0x28526

b8167590 e3a33010 e3a33010 00000080 bd04e0b0 0xe3a33010

b8167594 e3a33010 00000080 bd04e0b0 00000000 0xe3a33010

b8167598 00000000 bd04e0b0 00000000 00000000 0xe3a33010

STACK_COMMAND:.thread 0xffffffff88a18908 ; kb

FOLLOWUP_IP:

nv4_disp+28526

bd03a526 ?????

SYMBOL_STACK_INDEX:0

SYMBOL_NAME:nv4_disp+28526

FOLLOWUP_NAME:MachineOwner

FAILURE_BUCKET_ID:0xEA_IMAGE_nv4_disp.dll_DATE_2010_04_04

BUCKET_ID:0xEA_IMAGE_nv4_disp.dll_DATE_2010_04_04

Followup: MachineOwner

通過紅色的代碼可以分析出這個藍屏是由于顯卡驅(qū)動引起的

--------

總結(jié)

以上是生活随笔為你收集整理的python launcher卸载后蓝屏_使用dump文件分析系统蓝屏原因的全部內(nèi)容,希望文章能夠幫你解決所遇到的問題。

如果覺得生活随笔網(wǎng)站內(nèi)容還不錯,歡迎將生活随笔推薦給好友。