Bonjour,
J'aimerais pouvoir comprendre les résultats de ce fichier DMP que l'application WinDbg :
4: kd> !analyze -v
**
Bugcheck Analysis
**
SYSTEM_SERVICE_EXCEPTION (3b)
An exception happened while executing a system service routine.
Arguments:
Arg1: 0000000080000003, Exception code that caused the BugCheck
Arg2: fffff8055e7409f3, Address of the instruction which caused the BugCheck
Arg3: ffffc98288ab9dd0, Address of the context record for the exception that caused the BugCheck
Arg4: 0000000000000000, zero.
Debugging Details:
------------------
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 2343
Key : Analysis.DebugAnalysisManager
Value: Create
Key : Analysis.Elapsed.mSec
Value: 2357
Key : Analysis.IO.Other.Mb
Value: 0
Key : Analysis.IO.Read.Mb
Value: 0
Key : Analysis.IO.Write.Mb
Value: 0
Key : Analysis.Init.CPU.mSec
Value: 796
Key : Analysis.Init.Elapsed.mSec
Value: 67359
Key : Analysis.Memory.CommitPeak.Mb
Value: 97
Key : Bugcheck.Code.DumpHeader
Value: 0x3b
Key : Bugcheck.Code.KiBugCheckData
Value: 0x3b
Key : Bugcheck.Code.Register
Value: 0x3b
Key : WER.OS.Branch
Value: vb_release
Key : WER.OS.Timestamp
Value: 2019-12-06T14:06:00Z
Key : WER.OS.Version
Value: 10.0.19041.1
FILE_IN_CAB: MEMORY.DMP
BUGCHECK_CODE: 3b
BUGCHECK_P1: 80000003
BUGCHECK_P2: fffff8055e7409f3
BUGCHECK_P3: ffffc98288ab9dd0
BUGCHECK_P4: 0
CONTEXT: ffffc98288ab9dd0 -- (.cxr 0xffffc98288ab9dd0)
rax=ffffc98288aba7f8 rbx=ffffc98288abba28 rcx=0000000000000000
rdx=ffffc98288abba28 rsi=ffffc98288abb020 rdi=0000000000000000
rip=fffff8055e7409f3 rsp=ffffc98288aba7d0 rbp=ffffc98288abb7e8
r8=ffffc98288abb020 r9=ffffc98288abae60 r10=fffff8055e7ce480
r11=00000000000002c8 r12=ffffc98288abc7d0 r13=ffffc98288abb7e8
r14=ffffc98288abae60 r15=ffffc98288abb7e8
iopl=0 nv up ei pl zr na po nc
cs=0010 ss=0018 ds=002b es=002b fs=0053 gs=002b efl=00000246
nt!KeCheckStackAndTargetAddress+0x53:
fffff805`5e7409f3 cc int 3
Resetting default scope
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXPNP: 1 (!blackboxpnp)
BLACKBOXWINLOGON: 1
PROCESS_NAME: Taskmgr.exe
TRAP_FRAME: ffff800000000000 -- (.trap 0xffff800000000000)
Unable to read trap frame at ffff8000`00000000
STACK_TEXT:
ffffc98288aba7d0 fffff805
5e7ce4bb : ffffc98288aba868 fffff805
62fd5bd4 0000000000000000 00000000
00000000 : nt!KeCheckStackAndTargetAddress+0x53
ffffc98288aba800 fffff805
62f66fae : fffff80562fd5bd4 ffffc982
88abb7e8 ffffc98288abc7d0 ffffc982
88abae20 : nt!_C_specific_handler+0x3b
ffffc98288aba870 fffff805
5e8039c2 : fffff80563002678 ffffc982
88abae10 fffff80562f66f44 fffff805
631004da : dxgkrnl!_GSHandlerCheck_SEH+0x6a
ffffc98288aba8a0 fffff805
5e677a77 : ffffc98288abae10 00000000
00000000 ffffc98288abc7d0 fffff805
631004da : nt!RtlpExecuteHandlerForException+0x12
ffffc98288aba8d0 fffff805
5e676676 : ffffc98288abb7e8 ffffc982
88abb520 ffffc98288abb7e8 ffffa604
129b5000 : nt!RtlDispatchException+0x297
ffffc98288abaff0 fffff805
5e80d46c : 0000000000001000 ffffc982
88abb890 ffff800000000000 00000000
00000000 : nt!KiDispatchException+0x186
ffffc98288abb6b0 fffff805
5e808ebd : 0000000000000001 00000000
00000000 0000000000000000 00000000
00000001 : nt!KiExceptionDispatch+0x12c
ffffc98288abb890 00000000
00000000 : fffff805692df378 00000000
00000000 ffffa604175a3080 ffffa604
120d8000 : nt!KiPageFault+0x43d
SYMBOL_NAME: dxgkrnl!_GSHandlerCheck_SEH+6a
MODULE_NAME: dxgkrnl
IMAGE_NAME: dxgkrnl.sys
STACK_COMMAND: .cxr 0xffffc98288ab9dd0 ; kb
BUCKET_ID_FUNC_OFFSET: 6a
FAILURE_BUCKET_ID: 0x3B_80000003_dxgkrnl!_GSHandlerCheck_SEH
OS_VERSION: 10.0.19041.1
BUILDLAB_STR: vb_release
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {bb7d4166-3f2d-2bc7-f000-c92b3c7366b4}
Followup: MachineOwner
Je n'ai vraiment d'expérience dans le débogage. Je tente de trouver des ressources sur l'internet mais je n'ai pas encore eu de chance. Merci d'avance.