İlk mavi ekranımı yedim

Zurnadürüm

Kilopat
Katılım
25 Mayıs 2020
Mesajlar
7.048
Makaleler
22
Çözümler
55
Daha fazla  
Cinsiyet
Erkek
Herkese merhaba. Bu dakikalarda Windows internetteyken mavi ekran yedi. Fakat garip taraf bu ki, mşnşdump dosyalarına baktığımda bir tek .dmp dosyası vardı ve boyutu 0B yazıyordu. Sİzce ne yapmam lazım?
Yönetici olarak çalıştırınca da bu yazı çıkıyor.

Microsoft (R) Windows Debugger Version 10.0.20153.1000 AMD64 Copyright (c) Microsoft Corporation. All rights reserved. Loading Dump File [C:\Windows\Minidump\092420-36375-01.dmp] Mini Kernel Dump File: Only registers and stack trace are available ************* Path validation summary ************** Response Time (ms) Location Deferred srv* Symbol search path is: srv* Executable search path is: Windows 10 Kernel Version 19041 MP (8 procs) Free x64 Product: WinNt, suite: TerminalServer SingleUserTS Edition build lab: 19041.1.amd64fre.vb_release.191206-1406 Machine Name: Kernel base = 0xfffff807`80e00000 PsLoadedModuleList = 0xfffff807`81a2a310 Debug session time: Thu Sep 24 14:42:39.333 2020 (UTC + 4:00) System Uptime: 1 days 4:20:19.019 Loading Kernel Symbols ............................................................... ................................................................ ................................................................ ................ Loading User Symbols Loading unloaded module list .................................................. For analysis of this file, run !analyze -v nt!KeBugCheckEx: fffff807`811f3ea0 48894c2408 mov qword ptr [rsp+8],rcx ss:0018:ffff808b`87aa6170=000000000000010e Loading Dump File [C:\Windows\MEMORY.DMP] Kernel Bitmap Dump File: Kernel address space is available, User address space may not be available. Can't set dump file contexts MachineInfo::SetContext failed - Thread: 000002022AADFFC0 Handle: 1 Id: 1 - Error == 0x8000FFFF ************* Path validation summary ************** Response Time (ms) Location Deferred srv* Symbol search path is: srv* Executable search path is: Windows 10 Kernel Version 19041 MP (8 procs) Free x64 Product: WinNt, suite: TerminalServer SingleUserTS Edition build lab: 19041.1.amd64fre.vb_release.191206-1406 Machine Name: Kernel base = 0xfffff807`80e00000 PsLoadedModuleList = 0xfffff807`81a2a310 Debug session time: Thu Sep 24 14:42:39.333 2020 (UTC + 4:00) System Uptime: 1 days 4:20:19.019 Loading Kernel Symbols ............................................................... ................................................................ ................................................................ ................ Loading User Symbols Loading unloaded module list .................................................. nt!KeBugCheckEx: fffff807`811f3ea0 48894c2408 mov qword ptr [rsp+8],rcx ss:0018:ffff808b`87aa6170=000000000000010e ||1:0: kd> !analyze -v ******************************************************************************* * * * Bugcheck Analysis * * * ******************************************************************************* VIDEO_MEMORY_MANAGEMENT_INTERNAL (10e) The video memory manager encountered a condition that it can't recover from. By crashing, the video memory manager is attempting to get enough information into the minidump such that somebody can pinpoint what lead to this condition. Arguments: Arg1: 000000000000001d, The subtype of the bugcheck: Arg2: ffffc008f6edaef0 Arg3: 0000000000000000 Arg4: 0000000000000000 Debugging Details: ------------------ KEY_VALUES_STRING: 1 Key : Analysis.CPU.mSec Value: 2999 Key : Analysis.DebugAnalysisProvider.CPP Value: Create: 8007007e on DESKTOP-OHH9VN5 Key : Analysis.DebugData Value: CreateObject Key : Analysis.DebugModel Value: CreateObject Key : Analysis.Elapsed.mSec Value: 14883 Key : Analysis.Memory.CommitPeak.Mb Value: 111 Key : Analysis.System Value: CreateObject Key : WER.OS.Branch Value: vb_release Key : WER.OS.Timestamp Value: 2019-12-06T14:06:00Z Key : WER.OS.Version Value: 10.0.19041.1 ADDITIONAL_XML: 1 OS_BUILD_LAYERS: 1 BUGCHECK_CODE: 10e BUGCHECK_P1: 1d BUGCHECK_P2: ffffc008f6edaef0 BUGCHECK_P3: 0 BUGCHECK_P4: 0 BLACKBOXBSD: 1 (!blackboxbsd) BLACKBOXNTFS: 1 (!blackboxntfs) BLACKBOXPNP: 1 (!blackboxpnp) BLACKBOXWINLOGON: 1 PROCESS_NAME: System STACK_TEXT: ffff808b`87aa6168 fffff807`9c1c3ad0 : 00000000`0000010e 00000000`0000001d ffffc008`f6edaef0 00000000`00000000 : nt!KeBugCheckEx ffff808b`87aa6170 fffff807`9ba0d0c0 : 00000000`00000000 ffffc008`f6edaef0 ffffc008`f6af4dd0 00000000`00000000 : watchdog!WdLogEvent5_WdCriticalError+0xe0 ffff808b`87aa61b0 fffff807`9b9f27cb : 00000000`00000000 00000000`00000000 00000000`00000000 00010100`00000000 : dxgmms2!VIDMM_GLOBAL::UpdatePageTable+0x2ced0 ffff808b`87aa6440 fffff807`9b9e0c97 : 00000000`00000002 00000000`00006000 00000000`00000000 00000000`00000000 : dxgmms2!VIDMM_PAGE_TABLE::UpdatePageTableInvalidate+0xf3 ffff808b`87aa6510 fffff807`9b9df53d : 00000000`00000002 00000000`00006000 00000000`00000000 00000000`00000000 : dxgmms2!VIDMM_PAGE_TABLE::CommitVirtualAddressRange+0x2bf ffff808b`87aa65b0 fffff807`9ba0c46a : 00000000`00000002 ffffd385`2fa6b4f0 ffffd385`2fa7c001 00000000`00000000 : dxgmms2!VIDMM_PAGE_DIRECTORY::CommitVirtualAddressRange+0x77d ffff808b`87aa6720 fffff807`9b9de7fa : 00000000`00000005 ffffd385`2fa6b4f0 00000000`00001000 00000000`00000000 : dxgmms2!VIDMM_PAGE_DIRECTORY::CommitVirtualAddressRange+0x2d6aa ffff808b`87aa6890 fffff807`9b9dd6e4 : ffffc008`f659d210 ffffd385`00000002 00000000`00000000 00000000`00000000 : dxgmms2!CVirtualAddressAllocator::CommitVirtualAddressRange+0x2f6 ffff808b`87aa6a10 fffff807`9b9f249b : 00000000`00000103 00000000`00000000 0177572e`ffffbf90 00000000`00000000 : dxgmms2!VIDMM_GLOBAL::pageInOneAllocation+0x3b4 ffff808b`87aa6b30 fffff807`9b9e0c13 : 00000000`00000002 fffff807`817b2019 00000000`00000000 00000000`00000000 : dxgmms2!VIDMM_PAGE_TABLE::CommitPageTable+0x6f ffff808b`87aa6b80 fffff807`9b9df53d : 00000000`00000002 00000000`00005000 00000000`00000000 00000000`00000000 : dxgmms2!VIDMM_PAGE_TABLE::CommitVirtualAddressRange+0x23b ffff808b`87aa6c20 fffff807`9ba0c46a : 00000000`00000002 ffffd385`2fa6b4f0 ffffd385`3002d901 00000000`00000000 : dxgmms2!VIDMM_PAGE_DIRECTORY::CommitVirtualAddressRange+0x77d ffff808b`87aa6d90 fffff807`9b9de7fa : 00000000`00000005 ffffd385`2fa6b4f0 00000000`00001000 00000000`00000000 : dxgmms2!VIDMM_PAGE_DIRECTORY::CommitVirtualAddressRange+0x2d6aa ffff808b`87aa6f00 fffff807`9b9dd6e4 : ffffc008`f659d410 ffffd385`00000002 00000000`00000000 00000000`00000000 : dxgmms2!CVirtualAddressAllocator::CommitVirtualAddressRange+0x2f6 ffff808b`87aa7080 fffff807`9b9f249b : ffff808b`87aa7818 00000000`00004000 00000000`00000120 00000000`00000000 : dxgmms2!VIDMM_GLOBAL::pageInOneAllocation+0x3b4 ffff808b`87aa71a0 fffff807`9b9e0c13 : 00000000`00000002 ffff5c25`de3d2171 00000000`40270000 ffff808b`87aa7640 : dxgmms2!VIDMM_PAGE_TABLE::CommitPageTable+0x6f ffff808b`87aa71f0 fffff807`9b9df53d : 00000000`00000002 00000000`00000000 00000000`00000000 00000000`00000000 : dxgmms2!VIDMM_PAGE_TABLE::CommitVirtualAddressRange+0x23b ffff808b`87aa7290 fffff807`9ba0c46a : 00000000`00000002 ffffd385`2fa6b4f0 fffff807`00000001 00000000`00000000 : dxgmms2!VIDMM_PAGE_DIRECTORY::CommitVirtualAddressRange+0x77d ffff808b`87aa7400 fffff807`9b9de7fa : 00000000`00000007 ffffd385`2fa6b4f0 00000000`00000000 00000000`00000000 : dxgmms2!VIDMM_PAGE_DIRECTORY::CommitVirtualAddressRange+0x2d6aa ffff808b`87aa7570 fffff807`9b9e1308 : 00000000`ffffffff ffff808b`87aa7800 00000000`00000000 00000000`00001001 : dxgmms2!CVirtualAddressAllocator::CommitVirtualAddressRange+0x2f6 ffff808b`87aa76f0 fffff807`9ba0eedd : 00000000`00000000 00000000`00000071 ffff808b`87aa7880 ffffd385`2fa6b680 : dxgmms2!VIDMM_GLOBAL::CommitVirtualAddressRangeSystemCommand+0x188 ffff808b`87aa7780 fffff807`9b9fa442 : ffffd385`2fa6b650 ffff808b`00000001 00000000`00000001 ffffd385`2fa84980 : dxgmms2!VIDMM_GLOBAL::processSystemCommand+0x2c379 ffff808b`87aa7900 fffff807`9ba03d09 : ffffd385`2fa84910 ffffc008`fa2c0201 00000000`00000000 00000000`168c7000 : dxgmms2!VIDMM_WORKER_THREAD::Run+0x1462 ffff808b`87aa7ae0 fffff807`81066dd5 : ffffc008`fa2c0200 fffff807`9ba03d00 ffffd385`2fa84910 000fa4ef`bd9bbfff : dxgmms2!VidMmWorkerThreadProc+0x9 ffff808b`87aa7b10 fffff807`811fb4f8 : ffffe780`31186180 ffffc008`fa2c0200 fffff807`81066d80 00000000`00000000 : nt!PspSystemThreadStartup+0x55 ffff808b`87aa7b60 00000000`00000000 : ffff808b`87aa8000 ffff808b`87aa1000 00000000`00000000 00000000`00000000 : nt!KiStartSystemThread+0x28 SYMBOL_NAME: dxgmms2!VIDMM_GLOBAL::UpdatePageTable+2ced0 MODULE_NAME: dxgmms2 IMAGE_NAME: dxgmms2.sys IMAGE_VERSION: 10.0.19041.508 STACK_COMMAND: .thread ; .cxr ; kb BUCKET_ID_FUNC_OFFSET: 2ced0 FAILURE_BUCKET_ID: 0x10e_1d_dxgmms2!VIDMM_GLOBAL::UpdatePageTable OS_VERSION: 10.0.19041.1 BUILDLAB_STR: vb_release OSPLATFORM_TYPE: x64 OSNAME: Windows 10 FAILURE_ID_HASH: {71cfaed7-afd6-912e-e10e-336c7c7acd87} Followup: MachineOwner ---------

1600944839263.png


Ve bu çıkıyor.

.dmp dosyayı diske atamadım. Bu yüzden kusura bakmayın.


Google Drive'la Tanışın – Tüm dosyalarınız için tek bir yer minidump burada
 
Son düzenleyen: Moderatör:
Dosyayı paylaşın.
 
DDU ile kaldırıp başka driver kurun. Sorun devam ederse RAM'leri Memtest86 ile test edin
 
Son düzenleme:
RAM'leri Memtest86 ile test edin.
DDU ile kaldırıp başka driver kurun.

MemTest86 - Official Site of the x86 Memory Testing Tool link bu değil mi?
 
Ekran kartıyla ilgili olabilir. DDU ile kaldırıp yeniden yüklemeyi deneyin. Bir de MemTest86 ile RAM'leri test edin.
''dxgmms2'' hatasını vermiş, o yüzden böyle yazdım.
 

Yeni konular

Geri
Yukarı