THREAD_STUCK_IN_DEVICE_DRIVER hatası

zArteTR

Hectopat
Katılım
11 Haziran 2021
Mesajlar
162
Çözümler
1
Daha fazla  
Sistem Özellikleri
İ7 13700H TİGERLACE CORE NVİDİA RTX 4050 2X8 16 GB RAM 2X 512 GB M2 SSD (MONSTER ABRA A5 V20.3)
Cinsiyet
Erkek
Merhaba arkadaşlar ben laptopa format attım ve atmam sonucu THREAD_STUCK_IN_DEVICE_DRIVER hatası aldım. Nasıl çözebilirim bu hatayı?
 
Minidump dosyalarını göndermezseniz herhangi bir şey yapamayız.

 


Buyurun.
 
fazla söze gerek yok. Ekran kartınız bozuk.

ama yok ben emin olmak istiyorum derseniz şunları yapın:

DDU ile sürücüleri kaldırıp yeniden yükleyin.

ekran kartı driverlarınızı güncelleyin.

Bir de CMD üzerin sfc /scannow komutunu uygulayın.


laptopunuz eski olduğu için internette herhangi bir BIOS sürümü mevcut değil. Yüksek ihtimalle de günceldir zaten.

Bunları yaptıktan sonra yine mavi ekran alırsanız ekran kartınızın bozuk olduğunun göstergesi olur.

toplam 5 adet minidump dosyası var:

Kod:
THREAD_STUCK_IN_DEVICE_DRIVER_M (100000ea)
The device driver is spinning in an infinite loop, most likely waiting for.
hardware to become idle. This usually indicates problem with the hardware.
itself or with the device driver programming the hardware incorrectly.
If the kernel debugger is connected and running when watchdog detects a
timeout condition then DbgBreakPoint() will be called instead of KeBugCheckEx()
and detailed message including BugCheck arguments will be printed to the.
debugger. This way we can identify an offending thread, set breakpoints in it,
and hit go to return to the spinning code to debug it further. Because.
KeBugCheckEx() is not called the .BugCheck directive will not return BugCheck.
information in this case. The arguments are already printed out to the kernel.
debugger. You can also retrieve them from a global variable via.
"dd watchdog!g_WdBugCheckData l5" (use dq on NT64).
On MP machines it is possible to hit a timeout when the spinning thread is.
interrupted by hardware interrupt and ISR or DPC routine is running at the time.
of the BugCheck (this is because the timeout's work item can be delivered and.
handled on the second CPU and the same time). If this is the case you will have.
to look deeper at the offending thread's stack (e.g. using dds) to determine.
spinning code which caused the timeout to occur.
Arguments:
Arg1: ffff8a88dcac9080, Pointer to a stuck thread object. Do .thread then kb on it to find.
the hung location.
Arg2: 0000000000000000, Pointer to a DEFERRED_WATCHDOG object.
Arg3: 0000000000000000, Pointer to offending driver name.
Arg4: 0000000000000000, Number of times "intercepted" BugCheck 0xEA was hit (see notes).

Debugging Details:
------------------

*** WARNING: Unable to verify timestamp for atikmdag.sys

KEY_VALUES_STRING: 1

Key : Analysis.CPU.mSec
Value: 9233.

Key : Analysis.DebugAnalysisManager
Value: Create.

Key : Analysis.Elapsed.mSec
Value: 63153.

Key : Analysis.IO.Other.Mb
Value: 0

Key : Analysis.IO.Read.Mb
Value: 0

Key : Analysis.IO.Write.Mb
Value: 0

Key : Analysis.Init.CPU.mSec
Value: 1124.

Key : Analysis.Init.Elapsed.mSec
Value: 5316.

Key : Analysis.Memory.CommitPeak.Mb
Value: 92.

Key : Bugcheck.Code.DumpHeader
Value: 0x100000ea.

Key : Bugcheck.Code.Register
Value: 0xea.

Key : WER.OS.Branch
Value: vb_release.

Key : WER.OS.Timestamp
Value: 2019-12-06T14:06:00Z

Key : WER.OS.Version
Value: 10.0.19041.1

FILE_IN_CAB: 042023-20687-01.dmp

BUGCHECK_CODE: ea.

BUGCHECK_P1: ffff8a88dcac9080.

BUGCHECK_P2: 0

BUGCHECK_P3: 0

BUGCHECK_P4: 0

FAULTING_THREAD: ffff8a88dcac9080.

BLACKBOXBSD: 1 (!blackboxbsd)

BLACKBOXNTFS: 1 (!blackboxntfs)

CUSTOMER_CRASH_COUNT: 1

PROCESS_NAME: System.

STACK_TEXT:
ffffb30b`2a214038 fffff807`1f1f451d : 00000000`000000ea ffff8a88`dcac9080 00000000`00000000 00000000`00000000 : nt!KeBugCheckEx
ffffb30b`2a214040 fffff807`1f1f45fe : ffffb30b`2a214118 fffff807`23a41c38 ffffb30b`2a214118 ffff8a88`e17a3000 : dxgkrnl!TdrTimedOperationBugcheckOnTimeout+0x45
ffffb30b`2a2140b0 fffff807`23a52043 : ffff8a88`e17a3000 00000000`00000000 ffff8a88`e17a3000 fffff807`23a41c10 : dxgkrnl!TdrTimedOperationDelay+0xce
ffffb30b`2a2140f0 ffff8a88`e17a3000 : 00000000`00000000 ffff8a88`e17a3000 fffff807`23a41c10 00000000`01c9c380 : atikmdag+0x42043
ffffb30b`2a2140f8 00000000`00000000 : ffff8a88`e17a3000 fffff807`23a41c10 00000000`01c9c380 fffff807`23870028 : 0xffff8a88`e17a3000

SYMBOL_NAME: dxgkrnl!TdrTimedOperationBugcheckOnTimeout+45

MODULE_NAME: dxgkrnl.

IMAGE_NAME: dxgkrnl.sys

IMAGE_VERSION: 10.0.19041.1865

STACK_COMMAND: .process /r /p 0xffff8a88dca93040; .thread 0xffff8a88dcac9080 ; kb.

FAILURE_BUCKET_ID: 0xEA_IMAGE_dxgkrnl.sys

OS_VERSION: 10.0.19041.1

BUILDLAB_STR: vb_release.

OSPLATFORM_TYPE: x64.

OSNAME: Windows 10.

FAILURE_ID_HASH: {ea458ad2-d5ab-aa6c-7a11-54653c70dfb8}

Followup: MachineOwner.
---------

Bozuk

Kod:
THREAD_STUCK_IN_DEVICE_DRIVER_M (100000ea)
The device driver is spinning in an infinite loop, most likely waiting for.
hardware to become idle. This usually indicates problem with the hardware.
itself or with the device driver programming the hardware incorrectly.
If the kernel debugger is connected and running when watchdog detects a
timeout condition then DbgBreakPoint() will be called instead of KeBugCheckEx()
and detailed message including BugCheck arguments will be printed to the.
debugger. This way we can identify an offending thread, set breakpoints in it,
and hit go to return to the spinning code to debug it further. Because.
KeBugCheckEx() is not called the .BugCheck directive will not return BugCheck.
information in this case. The arguments are already printed out to the kernel.
debugger. You can also retrieve them from a global variable via.
"dd watchdog!g_WdBugCheckData l5" (use dq on NT64).
On MP machines it is possible to hit a timeout when the spinning thread is.
interrupted by hardware interrupt and ISR or DPC routine is running at the time.
of the BugCheck (this is because the timeout's work item can be delivered and.
handled on the second CPU and the same time). If this is the case you will have.
to look deeper at the offending thread's stack (e.g. using dds) to determine.
spinning code which caused the timeout to occur.
Arguments:
Arg1: ffff8a88dcac9080, Pointer to a stuck thread object. Do .thread then kb on it to find.
the hung location.
Arg2: 0000000000000000, Pointer to a DEFERRED_WATCHDOG object.
Arg3: 0000000000000000, Pointer to offending driver name.
Arg4: 0000000000000000, Number of times "intercepted" BugCheck 0xEA was hit (see notes).

Debugging Details:
------------------

*** WARNING: Unable to verify timestamp for atikmdag.sys

KEY_VALUES_STRING: 1

Key : Analysis.CPU.mSec
Value: 9233.

Key : Analysis.DebugAnalysisManager
Value: Create.

Key : Analysis.Elapsed.mSec
Value: 63153.

Key : Analysis.IO.Other.Mb
Value: 0

Key : Analysis.IO.Read.Mb
Value: 0

Key : Analysis.IO.Write.Mb
Value: 0

Key : Analysis.Init.CPU.mSec
Value: 1124.

Key : Analysis.Init.Elapsed.mSec
Value: 5316.

Key : Analysis.Memory.CommitPeak.Mb
Value: 92.

Key : Bugcheck.Code.DumpHeader
Value: 0x100000ea.

Key : Bugcheck.Code.Register
Value: 0xea.

Key : WER.OS.Branch
Value: vb_release.

Key : WER.OS.Timestamp
Value: 2019-12-06T14:06:00Z

Key : WER.OS.Version
Value: 10.0.19041.1

FILE_IN_CAB: 042023-20687-01.dmp

BUGCHECK_CODE: ea.

BUGCHECK_P1: ffff8a88dcac9080.

BUGCHECK_P2: 0

BUGCHECK_P3: 0

BUGCHECK_P4: 0

FAULTING_THREAD: ffff8a88dcac9080.

BLACKBOXBSD: 1 (!blackboxbsd)

BLACKBOXNTFS: 1 (!blackboxntfs)

CUSTOMER_CRASH_COUNT: 1

PROCESS_NAME: System.

STACK_TEXT:
ffffb30b`2a214038 fffff807`1f1f451d : 00000000`000000ea ffff8a88`dcac9080 00000000`00000000 00000000`00000000 : nt!KeBugCheckEx
ffffb30b`2a214040 fffff807`1f1f45fe : ffffb30b`2a214118 fffff807`23a41c38 ffffb30b`2a214118 ffff8a88`e17a3000 : dxgkrnl!TdrTimedOperationBugcheckOnTimeout+0x45
ffffb30b`2a2140b0 fffff807`23a52043 : ffff8a88`e17a3000 00000000`00000000 ffff8a88`e17a3000 fffff807`23a41c10 : dxgkrnl!TdrTimedOperationDelay+0xce
ffffb30b`2a2140f0 ffff8a88`e17a3000 : 00000000`00000000 ffff8a88`e17a3000 fffff807`23a41c10 00000000`01c9c380 : atikmdag+0x42043
ffffb30b`2a2140f8 00000000`00000000 : ffff8a88`e17a3000 fffff807`23a41c10 00000000`01c9c380 fffff807`23870028 : 0xffff8a88`e17a3000

SYMBOL_NAME: dxgkrnl!TdrTimedOperationBugcheckOnTimeout+45

MODULE_NAME: dxgkrnl.

IMAGE_NAME: dxgkrnl.sys

IMAGE_VERSION: 10.0.19041.1865

STACK_COMMAND: .process /r /p 0xffff8a88dca93040; .thread 0xffff8a88dcac9080 ; kb.

FAILURE_BUCKET_ID: 0xEA_IMAGE_dxgkrnl.sys

OS_VERSION: 10.0.19041.1

BUILDLAB_STR: vb_release.

OSPLATFORM_TYPE: x64.

OSNAME: Windows 10.

FAILURE_ID_HASH: {ea458ad2-d5ab-aa6c-7a11-54653c70dfb8}

Followup: MachineOwner.
---------

Bozuk

Kod:
THREAD_STUCK_IN_DEVICE_DRIVER_M (100000ea)
The device driver is spinning in an infinite loop, most likely waiting for.
hardware to become idle. This usually indicates problem with the hardware.
itself or with the device driver programming the hardware incorrectly.
If the kernel debugger is connected and running when watchdog detects a
timeout condition then DbgBreakPoint() will be called instead of KeBugCheckEx()
and detailed message including BugCheck arguments will be printed to the.
debugger. This way we can identify an offending thread, set breakpoints in it,
and hit go to return to the spinning code to debug it further. Because.
KeBugCheckEx() is not called the .BugCheck directive will not return BugCheck.
information in this case. The arguments are already printed out to the kernel.
debugger. You can also retrieve them from a global variable via.
"dd watchdog!g_WdBugCheckData l5" (use dq on NT64).
On MP machines it is possible to hit a timeout when the spinning thread is.
interrupted by hardware interrupt and ISR or DPC routine is running at the time.
of the BugCheck (this is because the timeout's work item can be delivered and.
handled on the second CPU and the same time). If this is the case you will have.
to look deeper at the offending thread's stack (e.g. using dds) to determine.
spinning code which caused the timeout to occur.
Arguments:
Arg1: ffffc50eff5be040, Pointer to a stuck thread object. Do .thread then kb on it to find.
the hung location.
Arg2: 0000000000000000, Pointer to a DEFERRED_WATCHDOG object.
Arg3: 0000000000000000, Pointer to offending driver name.
Arg4: 0000000000000000, Number of times "intercepted" BugCheck 0xEA was hit (see notes).

Debugging Details:
------------------

*** WARNING: Unable to verify timestamp for atikmdag.sys
*** WARNING: Unable to verify timestamp for win32k.sys

KEY_VALUES_STRING: 1

Key : Analysis.CPU.mSec
Value: 7156.

Key : Analysis.DebugAnalysisManager
Value: Create.

Key : Analysis.Elapsed.mSec
Value: 100509.

Key : Analysis.IO.Other.Mb
Value: 0

Key : Analysis.IO.Read.Mb
Value: 0

Key : Analysis.IO.Write.Mb
Value: 0

Key : Analysis.Init.CPU.mSec
Value: 811.

Key : Analysis.Init.Elapsed.mSec
Value: 3013.

Key : Analysis.Memory.CommitPeak.Mb
Value: 97.

Key : Bugcheck.Code.DumpHeader
Value: 0x100000ea.

Key : Bugcheck.Code.Register
Value: 0xea.

Key : WER.OS.Branch
Value: vb_release.

Key : WER.OS.Timestamp
Value: 2019-12-06T14:06:00Z

Key : WER.OS.Version
Value: 10.0.19041.1

FILE_IN_CAB: 042023-19343-01.dmp

BUGCHECK_CODE: ea.

BUGCHECK_P1: ffffc50eff5be040.

BUGCHECK_P2: 0

BUGCHECK_P3: 0

BUGCHECK_P4: 0

FAULTING_THREAD: ffffc50eff5be040.

CUSTOMER_CRASH_COUNT: 1

PROCESS_NAME: System.

STACK_TEXT:
ffffc081`557ee038 fffff801`8fa4451d : 00000000`000000ea ffffc50e`ff5be040 00000000`00000000 00000000`00000000 : nt!KeBugCheckEx
ffffc081`557ee040 fffff801`8fa445fe : ffffc081`557ee118 fffff801`96281e88 ffffc081`557ee118 ffffc50e`fd215000 : dxgkrnl!TdrTimedOperationBugcheckOnTimeout+0x45
ffffc081`557ee0b0 fffff801`96292393 : ffffc50e`fd215000 00000000`00000000 ffffc50e`fd215000 fffff801`96281e60 : dxgkrnl!TdrTimedOperationDelay+0xce
ffffc081`557ee0f0 ffffc50e`fd215000 : 00000000`00000000 ffffc50e`fd215000 fffff801`96281e60 00000000`01c9c380 : atikmdag+0x42393
ffffc081`557ee0f8 00000000`00000000 : ffffc50e`fd215000 fffff801`96281e60 00000000`01c9c380 00000000`00000028 : 0xffffc50e`fd215000

SYMBOL_NAME: dxgkrnl!TdrTimedOperationBugcheckOnTimeout+45

MODULE_NAME: dxgkrnl.

IMAGE_NAME: dxgkrnl.sys

IMAGE_VERSION: 10.0.19041.1865

STACK_COMMAND: .process /r /p 0xffffc50ef848f040; .thread 0xffffc50eff5be040 ; kb.

FAILURE_BUCKET_ID: 0xEA_IMAGE_dxgkrnl.sys

OS_VERSION: 10.0.19041.1

BUILDLAB_STR: vb_release.

OSPLATFORM_TYPE: x64.

OSNAME: Windows 10.

FAILURE_ID_HASH: {ea458ad2-d5ab-aa6c-7a11-54653c70dfb8}

Followup: MachineOwner.
---------

Eğer yardımcı olabildiysem çözüm olarak işaretlerseniz memnun olurum.
 
@Recep Baltaş hocam bir baksın yanlışım olabilir. Ama sorununuz bir donanımsal gibi görünüyor.

Kod:
: kd> !analyze -v
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

DRIVER_IRQL_NOT_LESS_OR_EQUAL (d1)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high.  This is usually
caused by drivers using improper addresses.
If kernel debugger is available get stack backtrace.
Arguments:
Arg1: 0000000000000000, memory referenced
Arg2: 000000000000000b, IRQL
Arg3: 0000000000000008, value 0 = read operation, 1 = write operation
Arg4: 0000000000000000, address which referenced memory

Debugging Details:
------------------

*** WARNING: Unable to verify timestamp for atikmdag.sys
*** WARNING: Unable to verify timestamp for win32k.sys

KEY_VALUES_STRING: 1

    Key  : Analysis.CPU.mSec
    Value: 4108

    Key  : Analysis.DebugAnalysisManager
    Value: Create

    Key  : Analysis.Elapsed.mSec
    Value: 85639

    Key  : Analysis.IO.Other.Mb
    Value: 0

    Key  : Analysis.IO.Read.Mb
    Value: 0

    Key  : Analysis.IO.Write.Mb
    Value: 1

    Key  : Analysis.Init.CPU.mSec
    Value: 296

    Key  : Analysis.Init.Elapsed.mSec
    Value: 2691

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 92

    Key  : Bugcheck.Code.DumpHeader
    Value: 0xd1

    Key  : Bugcheck.Code.Register
    Value: 0xa

    Key  : WER.OS.Branch
    Value: vb_release

    Key  : WER.OS.Timestamp
    Value: 2019-12-06T14:06:00Z

    Key  : WER.OS.Version
    Value: 10.0.19041.1


FILE_IN_CAB:  042023-31359-01.dmp

BUGCHECK_CODE:  d1

BUGCHECK_P1: 0

BUGCHECK_P2: b

BUGCHECK_P3: 8

BUGCHECK_P4: 0

READ_ADDRESS: fffff803568fb390: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
unable to get nt!MmSpecialPagesInUse
 0000000000000000

PROCESS_NAME:  System

CUSTOMER_CRASH_COUNT:  1

TRAP_FRAME:  fffff8035c47eb80 -- (.trap 0xfffff8035c47eb80)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=fffff80419102ef0 rbx=0000000000000000 rcx=ffff9184067f0000
rdx=0000000000000003 rsi=0000000000000000 rdi=0000000000000000
rip=0000000000000000 rsp=fffff8035c47ed18 rbp=ffff918406f71980
 r8=ffff918404d7e000  r9=fffff80418f00000 r10=ffff918406f671f0
r11=fffff8035c47ebf8 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0         nv up ei ng nz na pe nc
00000000`00000000 ??              ???
Resetting default scope

IP_IN_FREE_BLOCK: 0

FAILED_INSTRUCTION_ADDRESS:
+0
STACK_TEXT: 
fffff803`5c47ed18 fffff804`18f37491     : ffff9184`06f719d0 fffff804`18f8c420 00000000`001e8480 00000000`00000000 : 0x0
fffff803`5c47ed20 ffff9184`06f719d0     : fffff804`18f8c420 00000000`001e8480 00000000`00000000 00000000`00000001 : atikmdag+0x37491
fffff803`5c47ed28 fffff804`18f8c420     : 00000000`001e8480 00000000`00000000 00000000`00000001 fffff804`18f854ff : 0xffff9184`06f719d0
fffff803`5c47ed30 00000000`001e8480     : 00000000`00000000 00000000`00000001 fffff804`18f854ff ffff9184`06f671f0 : atikmdag+0x8c420
fffff803`5c47ed38 00000000`00000000     : 00000000`00000001 fffff804`18f854ff ffff9184`06f671f0 fffff804`18f88b69 : 0x1e8480


STACK_COMMAND:  .trap 0xfffff8035c47eb80 ; kb

SYMBOL_NAME:  atikmdag+37491

MODULE_NAME: atikmdag

IMAGE_NAME:  atikmdag.sys

BUCKET_ID_FUNC_OFFSET:  37491

FAILURE_BUCKET_ID:  AV_CODE_AV_NULL_IP_atikmdag!unknown_function

OS_VERSION:  10.0.19041.1

BUILDLAB_STR:  vb_release

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

FAILURE_ID_HASH:  {20ec212d-07a8-e5e2-b5f1-885330edcb5d}

Followup:     MachineOwner
---------

0: kd> !sysinfo machineid
sysinfo: could not find necessary interfaces.
sysinfo: note that mssmbios.sys must be loaded (XPSP2+).
0: kd> dx KiBugCheckDriver
Unimplemented error for KiBugCheckDriver
*************************************************************************
***                                                                   ***
***                                                                   ***
***    Either you specified an unqualified symbol, or your debugger   ***
***    doesn't have full symbol information.  Unqualified symbol      ***
***    resolution is turned off by default. Please either specify a   ***
***    fully qualified symbol module!symbolname, or enable resolution ***
***    of unqualified symbols by typing ".symopt- 100". Note that     ***
***    enabling unqualified symbol resolution with network symbol     ***
***    server shares in the symbol path may cause the debugger to     ***
***    appear to hang for long periods of time when an incorrect      ***
***    symbol name is typed or the network symbol server is down.     ***
***                                                                   ***
***    For some commands to work properly, your symbol path           ***
***    must point to .pdb files that have full type information.      ***
***                                                                   ***
***    Certain .pdb files (such as the public OS symbols) do not      ***
***    contain the required information.  Contact the group that      ***
***    provided you with these symbols if you need this command to    ***
***    work.                                                          ***
***                                                                   ***
***    Type referenced: KiBugCheckDriver                              ***
***                                                                   ***
*************************************************************************
Error: Unable to bind name 'KiBugCheckDriver'
0: kd> ln 0000000000000000
Browse module
Set bu breakpoint

0: kd>  !pool
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
The pool page you have specified is not in this dump.
0: kd> !pool 0000000000000000
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
The pool page you have specified is not in this dump.
0: kd> !irql
Debugger saved IRQL for processor 0x0 -- 11
--------
THREAD_STUCK_IN_DEVICE_DRIVER_M (100000ea)
The device driver is spinning in an infinite loop, most likely waiting for
hardware to become idle. This usually indicates problem with the hardware
itself or with the device driver programming the hardware incorrectly.
If the kernel debugger is connected and running when watchdog detects a
timeout condition then DbgBreakPoint() will be called instead of KeBugCheckEx()
and detailed message including BugCheck arguments will be printed to the
debugger. This way we can identify an offending thread, set breakpoints in it,
and hit go to return to the spinning code to debug it further. Because
KeBugCheckEx() is not called the .BugCheck directive will not return BugCheck
information in this case. The arguments are already printed out to the kernel
debugger. You can also retrieve them from a global variable via
"dd watchdog!g_WdBugCheckData l5" (use dq on NT64).
On MP machines it is possible to hit a timeout when the spinning thread is
interrupted by hardware interrupt and ISR or DPC routine is running at the time
of the BugCheck (this is because the timeout's work item can be delivered and
handled on the second CPU and the same time). If this is the case you will have
to look deeper at the offending thread's stack (e.g. using dds) to determine
spinning code which caused the timeout to occur.
Arguments:
Arg1: ffffc50eff5be040, Pointer to a stuck thread object.  Do .thread then kb on it to find
    the hung location.
Arg2: 0000000000000000, Pointer to a DEFERRED_WATCHDOG object.
Arg3: 0000000000000000, Pointer to offending driver name.
Arg4: 0000000000000000, Number of times "intercepted" BugCheck 0xEA was hit (see notes).

Debugging Details:
------------------

*** WARNING: Unable to verify timestamp for atikmdag.sys
*** WARNING: Unable to verify timestamp for win32k.sys

KEY_VALUES_STRING: 1

    Key  : Analysis.CPU.mSec
    Value: 3952

    Key  : Analysis.DebugAnalysisManager
    Value: Create

    Key  : Analysis.Elapsed.mSec
    Value: 102793

    Key  : Analysis.IO.Other.Mb
    Value: 2

    Key  : Analysis.IO.Read.Mb
    Value: 0

    Key  : Analysis.IO.Write.Mb
    Value: 3

    Key  : Analysis.Init.CPU.mSec
    Value: 421

    Key  : Analysis.Init.Elapsed.mSec
    Value: 7637

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 93

    Key  : Bugcheck.Code.DumpHeader
    Value: 0x100000ea

    Key  : Bugcheck.Code.Register
    Value: 0xea

    Key  : WER.OS.Branch
    Value: vb_release

    Key  : WER.OS.Timestamp
    Value: 2019-12-06T14:06:00Z

    Key  : WER.OS.Version
    Value: 10.0.19041.1


FILE_IN_CAB:  042023-19343-01.dmp

BUGCHECK_CODE:  ea

BUGCHECK_P1: ffffc50eff5be040

BUGCHECK_P2: 0

BUGCHECK_P3: 0

BUGCHECK_P4: 0

FAULTING_THREAD:  ffffc50eff5be040

CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  System

STACK_TEXT:  
ffffc081`557ee038 fffff801`8fa4451d     : 00000000`000000ea ffffc50e`ff5be040 00000000`00000000 00000000`00000000 : nt!KeBugCheckEx
ffffc081`557ee040 fffff801`8fa445fe     : ffffc081`557ee118 fffff801`96281e88 ffffc081`557ee118 ffffc50e`fd215000 : dxgkrnl!TdrTimedOperationBugcheckOnTimeout+0x45
ffffc081`557ee0b0 fffff801`96292393     : ffffc50e`fd215000 00000000`00000000 ffffc50e`fd215000 fffff801`96281e60 : dxgkrnl!TdrTimedOperationDelay+0xce
ffffc081`557ee0f0 ffffc50e`fd215000     : 00000000`00000000 ffffc50e`fd215000 fffff801`96281e60 00000000`01c9c380 : atikmdag+0x42393
ffffc081`557ee0f8 00000000`00000000     : ffffc50e`fd215000 fffff801`96281e60 00000000`01c9c380 00000000`00000028 : 0xffffc50e`fd215000


SYMBOL_NAME:  dxgkrnl!TdrTimedOperationBugcheckOnTimeout+45

MODULE_NAME: dxgkrnl

IMAGE_NAME:  dxgkrnl.sys

IMAGE_VERSION:  10.0.19041.1865

STACK_COMMAND:  .process /r /p 0xffffc50ef848f040; .thread 0xffffc50eff5be040 ; kb

FAILURE_BUCKET_ID:  0xEA_IMAGE_dxgkrnl.sys

OS_VERSION:  10.0.19041.1

BUILDLAB_STR:  vb_release

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

FAILURE_ID_HASH:  {ea458ad2-d5ab-aa6c-7a11-54653c70dfb8}

Followup:     MachineOwner
---------

2: kd> lm
start             end                 module name
fffff801`7e650000 fffff801`7e8df000   mcupdate_GenuineIntel # (pdb symbols)          C:\ProgramData\Dbg\sym\mcupdate_GenuineIntel.pdb\2C3A3196EBAFC0B94B0D69BAE95496D91\mcupdate_GenuineIntel.pdb
fffff801`7e8e0000 fffff801`7e8e6000   hal        (deferred)             
fffff801`7e8f0000 fffff801`7e8fb000   kd         (deferred)             
fffff801`7e900000 fffff801`7e927000   tm         (deferred)             
fffff801`7e930000 fffff801`7e99b000   CLFS       (deferred)             
fffff801`7e9a0000 fffff801`7e9ba000   PSHED      (deferred)             
fffff801`7e9c0000 fffff801`7e9cb000   BOOTVID    (deferred)             
fffff801`7e9d0000 fffff801`7ea3d000   FLTMGR     (deferred)             
fffff801`7ea40000 fffff801`7ea4e000   cmimcext   (deferred)             
fffff801`7ec00000 fffff801`7ed84000   BTHport    (deferred)             
fffff801`7ed90000 fffff801`7ee71000   dxgmms2    (deferred)             
fffff801`7ee90000 fffff801`7eee4000   usbvideo   (deferred)             
fffff801`7eef0000 fffff801`7ef0b000   monitor    (deferred)             
fffff801`7ef20000 fffff801`7ef2f000   dump_diskdump   (deferred)             
fffff801`7ef70000 fffff801`7efa2000   dump_storahci   (deferred)             
fffff801`7efd0000 fffff801`7efed000   dump_dumpfve   (deferred)             
fffff801`7eff0000 fffff801`7f026000   wcifs      (deferred)             
fffff801`7f060000 fffff801`7f09f000   HIDCLASS   (deferred)             
fffff801`7f0a0000 fffff801`7f0b3000   HIDPARSE   (deferred)             
fffff801`7f0c0000 fffff801`7f0d0000   mouhid     (deferred)             
fffff801`7f0e0000 fffff801`7f0f1000   kbdhid     (deferred)             
fffff801`7f100000 fffff801`7f121000   BTHUSB     (deferred)             
fffff801`7f130000 fffff801`7f1a3000   dxgmms1    (deferred)             
fffff801`7f1b0000 fffff801`7f1c4000   mmcss      (deferred)             
fffff801`7f1d0000 fffff801`7f1f9000   luafv      (deferred)             
fffff801`7f200000 fffff801`80246000   nt         (pdb symbols)          C:\ProgramData\Dbg\sym\ntkrnlmp.pdb\68A17FAF3012B7846079AEECDBE0A5831\ntkrnlmp.pdb
fffff801`84000000 fffff801`84117000   clipsp     (deferred)             
fffff801`84120000 fffff801`84149000   ksecdd     (deferred)             
fffff801`84150000 fffff801`841b1000   msrpc      (deferred)             
fffff801`841c0000 fffff801`841d1000   werkernel   (deferred)             
fffff801`841e0000 fffff801`841ec000   ntosext    (deferred)             
fffff801`841f0000 fffff801`842d7000   CI         (deferred)             
fffff801`842e0000 fffff801`8439b000   cng        (deferred)             
fffff801`843a0000 fffff801`84471000   Wdf01000   (deferred)             
fffff801`84480000 fffff801`84493000   WDFLDR     (deferred)             
fffff801`844a0000 fffff801`844af000   SleepStudyHelper   (deferred)             
fffff801`844b0000 fffff801`844c1000   WppRecorder   (deferred)             
fffff801`844d0000 fffff801`844f6000   acpiex     (deferred)             
fffff801`84500000 fffff801`8451a000   SgrmAgent   (deferred)             
fffff801`84520000 fffff801`845ec000   ACPI       (deferred)             
fffff801`845f0000 fffff801`845fc000   WMILIB     (deferred)             
fffff801`84620000 fffff801`8468b000   intelpep   (deferred)             
fffff801`84690000 fffff801`846a7000   WindowsTrustedRT   (deferred)             
fffff801`846b0000 fffff801`846bb000   IntelTA    (deferred)             
fffff801`846c0000 fffff801`846cb000   WindowsTrustedRTProxy   (deferred)             
fffff801`846d0000 fffff801`846e4000   pcw        (deferred)             
fffff801`846f0000 fffff801`846fb000   msisadrv   (deferred)             
fffff801`84700000 fffff801`84777000   pci        (deferred)             
fffff801`84780000 fffff801`84795000   vdrvroot   (deferred)             
fffff801`847a0000 fffff801`847cf000   pdc        (deferred)             
fffff801`847d0000 fffff801`847e9000   CEA        (deferred)             
fffff801`847f0000 fffff801`847fd000   Fs_Rec     (deferred)             
fffff801`84800000 fffff801`84831000   partmgr    (deferred)             
fffff801`84840000 fffff801`848ec000   spaceport   (deferred)             
fffff801`848f0000 fffff801`84909000   volmgr     (deferred)             
fffff801`84910000 fffff801`84973000   volmgrx    (deferred)             
fffff801`84980000 fffff801`8499e000   mountmgr   (deferred)             
fffff801`849a0000 fffff801`849d2000   storahci   (deferred)             
fffff801`849e0000 fffff801`84a95000   storport   (deferred)             
fffff801`84aa0000 fffff801`84abc000   EhStorClass   (deferred)             
fffff801`84ac0000 fffff801`84ada000   fileinfo   (deferred)             
fffff801`84ae0000 fffff801`84b20000   Wof        (deferred)             
fffff801`84b30000 fffff801`84b8a000   WdFilter   (deferred)             
fffff801`84b90000 fffff801`84e67000   Ntfs       (deferred)             
fffff801`84e70000 fffff801`84fdf000   ndis       (deferred)             
fffff801`84fe0000 fffff801`85078000   NETIO      (deferred)             
fffff801`85080000 fffff801`850b2000   ksecpkg    (deferred)             
fffff801`850c0000 fffff801`853ac000   tcpip      (deferred)             
fffff801`853b0000 fffff801`8542f000   fwpkclnt   (deferred)             
fffff801`85430000 fffff801`85460000   wfplwfs    (deferred)             
fffff801`85470000 fffff801`85483000   amdkmpfd   (deferred)             
fffff801`85490000 fffff801`85558000   fvevol     (deferred)             
fffff801`85560000 fffff801`8556b000   volume     (deferred)             
fffff801`85570000 fffff801`855dd000   volsnap    (deferred)             
fffff801`855e0000 fffff801`85630000   rdyboost   (deferred)             
fffff801`85640000 fffff801`85666000   mup        (deferred)             
fffff801`85670000 fffff801`85682000   iorate     (deferred)             
fffff801`856b0000 fffff801`856cf000   disk       (deferred)             
fffff801`856d0000 fffff801`8573f000   CLASSPNP   (deferred)             
fffff801`8fa00000 fffff801`8fdaa000   dxgkrnl    (pdb symbols)          C:\ProgramData\Dbg\sym\dxgkrnl.pdb\31824B205114B2353ABBE43FF0D337EA1\dxgkrnl.pdb
fffff801`8fdb0000 fffff801`8fdc8000   watchdog   (deferred)             
fffff801`8fdd0000 fffff801`8fde6000   BasicDisplay   (deferred)             
fffff801`8fdf0000 fffff801`8fe01000   BasicRender   (deferred)             
fffff801`8fe10000 fffff801`8fe2c000   Npfs       (deferred)             
fffff801`8fe30000 fffff801`8fe41000   Msfs       (deferred)             
fffff801`8fe50000 fffff801`8fe6e000   CimFS      (deferred)             
fffff801`8fe70000 fffff801`8fe92000   tdx        (deferred)             
fffff801`8fea0000 fffff801`8feb0000   TDI        (deferred)             
fffff801`8fec0000 fffff801`8fef4000   usbccgp    (deferred)             
fffff801`8ff20000 fffff801`8ff3e000   crashdmp   (deferred)             
fffff801`8ff40000 fffff801`8ff70000   cdrom      (deferred)             
fffff801`8ff80000 fffff801`8ff95000   filecrypt   (deferred)             
fffff801`8ffa0000 fffff801`8ffae000   tbs        (deferred)             
fffff801`8ffb0000 fffff801`8ffba000   Null       (deferred)             
fffff801`8ffc0000 fffff801`8ffca000   Beep       (deferred)             
fffff801`91000000 fffff801`910a1000   Vid        (deferred)             
fffff801`910b0000 fffff801`910d1000   winhvr     (deferred)             
fffff801`910e0000 fffff801`9115b000   rdbss      (deferred)             
fffff801`91160000 fffff801`91172000   nsiproxy   (deferred)             
fffff801`91180000 fffff801`9118e000   npsvctrig   (deferred)             
fffff801`91190000 fffff801`911a0000   mssmbios # (pdb symbols)          C:\ProgramData\Dbg\sym\mssmbios.pdb\53ADC03D875B3F78AC94CE4D75054C461\mssmbios.pdb
fffff801`911b0000 fffff801`911ba000   gpuenergydrv   (deferred)             
fffff801`911c0000 fffff801`911ec000   dfsc       (deferred)             
fffff801`91210000 fffff801`9127c000   fastfat    (deferred)             
fffff801`91280000 fffff801`91297000   bam        (deferred)             
fffff801`912a0000 fffff801`912ee000   ahcache    (deferred)             
fffff801`912f0000 fffff801`91302000   CompositeBus   (deferred)             
fffff801`91310000 fffff801`9131d000   kdnic      (deferred)             
fffff801`91320000 fffff801`91335000   umbus      (deferred)             
fffff801`91340000 fffff801`91355000   CAD        (deferred)             
fffff801`91360000 fffff801`91409000   atikmpag   (deferred)             
fffff801`91410000 fffff801`91837000   athw8x     (deferred)             
fffff801`91840000 fffff801`918c5000   usbhub     (deferred)             
fffff801`918d0000 fffff801`9193f000   HdAudio    (deferred)             
fffff801`91940000 fffff801`9194f000   ksthunk    (deferred)             
fffff801`91950000 fffff801`919f3000   UsbHub3    (deferred)             
fffff801`91a00000 fffff801`91a12000   hidusb     (deferred)             
fffff801`91a20000 fffff801`91a7c000   netbt      (deferred)             
fffff801`91a80000 fffff801`91a94000   afunix     (deferred)             
fffff801`91aa0000 fffff801`91b45000   afd        (deferred)             
fffff801`91b50000 fffff801`91b6a000   vwififlt   (deferred)             
fffff801`91b70000 fffff801`91b9b000   pacer      (deferred)             
fffff801`91ba0000 fffff801`91bb4000   ndiscap    (deferred)             
fffff801`91bc0000 fffff801`91bd4000   netbios    (deferred)             
fffff801`95e00000 fffff801`95e44000   ucx01000   (deferred)             
fffff801`95e50000 fffff801`95e6a000   usbehci    (deferred)             
fffff801`95e70000 fffff801`95ee9000   USBPORT    (deferred)             
fffff801`95ef0000 fffff801`95f15000   HDAudBus   (deferred)             
fffff801`95f20000 fffff801`95f86000   portcls    (deferred)             
fffff801`95f90000 fffff801`95fb1000   drmk       (deferred)             
fffff801`95fc0000 fffff801`96036000   ks         (deferred)             
fffff801`96040000 fffff801`960ed000   rt640x64   (deferred)             
fffff801`960f0000 fffff801`960fe000   vwifibus   (deferred)             
fffff801`96100000 fffff801`96121000   i8042prt   (deferred)             
fffff801`96130000 fffff801`96143000   mouclass   (deferred)             
fffff801`96150000 fffff801`96164000   kbdclass   (deferred)             
fffff801`96170000 fffff801`9617f000   CmBatt     (deferred)             
fffff801`96180000 fffff801`96190000   BATTC      (deferred)             
fffff801`961a0000 fffff801`961ac000   wmiacpi    (deferred)             
fffff801`961b0000 fffff801`961f1000   intelppm   (deferred)             
fffff801`96200000 fffff801`9620d000   NdisVirtualBus   (deferred)             
fffff801`96210000 fffff801`9621c000   swenum     (deferred)             
fffff801`96220000 fffff801`9622c000   iwdbus     (deferred)             
fffff801`96230000 fffff801`9623e000   rdpbus     (deferred)             
fffff801`96240000 fffff801`9624e000   USBD       (deferred)             
fffff801`96250000 fffff801`9775f000   atikmdag T (no symbols)           
fffff801`97760000 fffff801`977fe000   USBXHCI    (deferred)             
fffff801`a1600000 fffff801`a1627000   bindflt    (deferred)             
fffff801`a1630000 fffff801`a1640000   MSKSSRV    (deferred)             
fffff801`a1650000 fffff801`a168d000   rfcomm     (deferred)             
fffff801`a1690000 fffff801`a16b2000   BthEnum    (deferred)             
fffff801`a16c0000 fffff801`a16e6000   bthpan     (deferred)             
fffff801`a16f0000 fffff801`a1708000   lltdio     (deferred)             
fffff801`a1710000 fffff801`a1728000   mslldp     (deferred)             
fffff801`a1730000 fffff801`a174b000   rspndr     (deferred)             
fffff801`a1750000 fffff801`a180f000   nwifi      (deferred)             
fffff801`a1810000 fffff801`a1828000   ndisuio    (deferred)             
fffff801`a1830000 fffff801`a1886000   msquic     (deferred)             
fffff801`a1930000 fffff801`a19b1000   cldflt     (deferred)             
fffff801`a19c0000 fffff801`a19da000   storqosflt   (deferred)             
fffff801`a8800000 fffff801`a8852000   mrxsmb10   (deferred)             
fffff801`a8860000 fffff801`a8927000   srv2       (deferred)             
fffff801`a8930000 fffff801`a8957000   Ndu        (deferred)             
fffff801`a8960000 fffff801`a8a37000   peauth     (deferred)             
fffff801`a8a40000 fffff801`a8a55000   tcpipreg   (deferred)             
fffff801`a8a60000 fffff801`a8a72000   WdNisDrv   (deferred)             
fffff801`a94a0000 fffff801`a9627000   HTTP       (deferred)             
fffff801`a9630000 fffff801`a964a000   mpsdrv     (deferred)             
fffff801`a9650000 fffff801`a9675000   bowser     (deferred)             
fffff801`a9680000 fffff801`a9715000   mrxsmb     (deferred)             
fffff801`a9720000 fffff801`a9766000   mrxsmb20   (deferred)             
fffff801`a9770000 fffff801`a9783000   vwifimp    (deferred)             
fffff801`a9790000 fffff801`a97e6000   srvnet     (deferred)             
fffff98e`db200000 fffff98e`db4d3000   win32kbase   (deferred)             
fffff98e`db4e0000 fffff98e`db895000   win32kfull   (deferred)             
fffff98e`db8a0000 fffff98e`db8e9000   cdd        (deferred)             
fffff98e`dbee0000 fffff98e`dbf7a000   win32k   T (no symbols)           

Unloaded modules:
fffff801`7ee80000 fffff801`7ee8c000   WdmCompanion
fffff801`911f0000 fffff801`9120c000   dam.sys 
fffff801`84600000 fffff801`84611000   WdBoot.sys
fffff801`85690000 fffff801`856a1000   hwpolicy.sys
 
Ekran kartı hakkı rahmetine kavuşmuş yüksek ihtimal.
atikmdag hatasından ve ekran kartı ile ilgili Windows sürücülerinin hata vermesi anlaşılıyor.
 
Ekran kartı hakkı rahmetine kavuşmuş yüksek ihtimal.
Atikmdag hatasından ve ekran kartı ile ilgili Windows sürücülerinin hata vermesi anlaşılıyor.

IRQL komutu ile verdiği hatadan da belli oluyor ama yeni yeni öğreniyorum %100 emin olmadığım şey için de yanlış bilgilendirmek istemedim.
 
Windows Resource Protection found corrupt files and successfully repaired them.
For online repairs, details are included in the CBS log file located at
windir\Logs\CBS\CBS.log. For example C:\Windows\Logs\CBS\CBS.log. For offline
repairs, details are included in the log file provided by the /OFFLOGFILE flag.

IRQL komutu ile verdiği hatadan da belli oluyor ama yeni yeni öğreniyorum %100 emin olmadığım şey için de yanlış bilgilendirmek istemedim.
bana böyle bir yazı yazdı ne anlama gelmekte ?
 

Sistem dosyaları ile alakalı bazı sorunlar yapılandırılmış. Birkaç Windows dosyası düzeltilmiş.
 
Sistem dosyaları ile alakalı bazı sorunlar yapılandırılmış. Birkaç Windows dosyası düzeltilmiş.
ddu yu hangi steden indirebilirim nasıl indirebilirim ?
 

Bu konuyu görüntüleyen kullanıcılar

Bu siteyi kullanmak için çerezler gereklidir. Siteyi kullanmaya devam etmek için çerezleri kabul etmelisiniz. Daha Fazlasını Öğren.…