Minidump dosyalarını göndermezseniz herhangi bir şey yapamayız.
Minidump Dosyalarını Paylaşın
23.06.2025 tarihinde yapılan güncel rehbere aşağıdaki linkten erişebilirsiniz: https://www.technopat.net/sosyal/konu/minidump-nedir-nasil-paylasilir.3817531/ Minidump dosyaları, bilgisayarınız mavi ekran verdiğinde belleğin ufak bir dökümünü barındıran dosyalardır. Bunları analiz ederek mavi...www.technopat.net
sfc /scannow komutunu uygulayın.THREAD_STUCK_IN_DEVICE_DRIVER_M (100000ea)
The device driver is spinning in an infinite loop, most likely waiting for.
hardware to become idle. This usually indicates problem with the hardware.
itself or with the device driver programming the hardware incorrectly.
If the kernel debugger is connected and running when watchdog detects a
timeout condition then DbgBreakPoint() will be called instead of KeBugCheckEx()
and detailed message including BugCheck arguments will be printed to the.
debugger. This way we can identify an offending thread, set breakpoints in it,
and hit go to return to the spinning code to debug it further. Because.
KeBugCheckEx() is not called the .BugCheck directive will not return BugCheck.
information in this case. The arguments are already printed out to the kernel.
debugger. You can also retrieve them from a global variable via.
"dd watchdog!g_WdBugCheckData l5" (use dq on NT64).
On MP machines it is possible to hit a timeout when the spinning thread is.
interrupted by hardware interrupt and ISR or DPC routine is running at the time.
of the BugCheck (this is because the timeout's work item can be delivered and.
handled on the second CPU and the same time). If this is the case you will have.
to look deeper at the offending thread's stack (e.g. using dds) to determine.
spinning code which caused the timeout to occur.
Arguments:
Arg1: ffff8a88dcac9080, Pointer to a stuck thread object. Do .thread then kb on it to find.
the hung location.
Arg2: 0000000000000000, Pointer to a DEFERRED_WATCHDOG object.
Arg3: 0000000000000000, Pointer to offending driver name.
Arg4: 0000000000000000, Number of times "intercepted" BugCheck 0xEA was hit (see notes).
Debugging Details:
------------------
*** WARNING: Unable to verify timestamp for atikmdag.sys
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 9233.
Key : Analysis.DebugAnalysisManager
Value: Create.
Key : Analysis.Elapsed.mSec
Value: 63153.
Key : Analysis.IO.Other.Mb
Value: 0
Key : Analysis.IO.Read.Mb
Value: 0
Key : Analysis.IO.Write.Mb
Value: 0
Key : Analysis.Init.CPU.mSec
Value: 1124.
Key : Analysis.Init.Elapsed.mSec
Value: 5316.
Key : Analysis.Memory.CommitPeak.Mb
Value: 92.
Key : Bugcheck.Code.DumpHeader
Value: 0x100000ea.
Key : Bugcheck.Code.Register
Value: 0xea.
Key : WER.OS.Branch
Value: vb_release.
Key : WER.OS.Timestamp
Value: 2019-12-06T14:06:00Z
Key : WER.OS.Version
Value: 10.0.19041.1
FILE_IN_CAB: 042023-20687-01.dmp
BUGCHECK_CODE: ea.
BUGCHECK_P1: ffff8a88dcac9080.
BUGCHECK_P2: 0
BUGCHECK_P3: 0
BUGCHECK_P4: 0
FAULTING_THREAD: ffff8a88dcac9080.
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: System.
STACK_TEXT:
ffffb30b`2a214038 fffff807`1f1f451d : 00000000`000000ea ffff8a88`dcac9080 00000000`00000000 00000000`00000000 : nt!KeBugCheckEx
ffffb30b`2a214040 fffff807`1f1f45fe : ffffb30b`2a214118 fffff807`23a41c38 ffffb30b`2a214118 ffff8a88`e17a3000 : dxgkrnl!TdrTimedOperationBugcheckOnTimeout+0x45
ffffb30b`2a2140b0 fffff807`23a52043 : ffff8a88`e17a3000 00000000`00000000 ffff8a88`e17a3000 fffff807`23a41c10 : dxgkrnl!TdrTimedOperationDelay+0xce
ffffb30b`2a2140f0 ffff8a88`e17a3000 : 00000000`00000000 ffff8a88`e17a3000 fffff807`23a41c10 00000000`01c9c380 : atikmdag+0x42043
ffffb30b`2a2140f8 00000000`00000000 : ffff8a88`e17a3000 fffff807`23a41c10 00000000`01c9c380 fffff807`23870028 : 0xffff8a88`e17a3000
SYMBOL_NAME: dxgkrnl!TdrTimedOperationBugcheckOnTimeout+45
MODULE_NAME: dxgkrnl.
IMAGE_NAME: dxgkrnl.sys
IMAGE_VERSION: 10.0.19041.1865
STACK_COMMAND: .process /r /p 0xffff8a88dca93040; .thread 0xffff8a88dcac9080 ; kb.
FAILURE_BUCKET_ID: 0xEA_IMAGE_dxgkrnl.sys
OS_VERSION: 10.0.19041.1
BUILDLAB_STR: vb_release.
OSPLATFORM_TYPE: x64.
OSNAME: Windows 10.
FAILURE_ID_HASH: {ea458ad2-d5ab-aa6c-7a11-54653c70dfb8}
Followup: MachineOwner.
---------
THREAD_STUCK_IN_DEVICE_DRIVER_M (100000ea)
The device driver is spinning in an infinite loop, most likely waiting for.
hardware to become idle. This usually indicates problem with the hardware.
itself or with the device driver programming the hardware incorrectly.
If the kernel debugger is connected and running when watchdog detects a
timeout condition then DbgBreakPoint() will be called instead of KeBugCheckEx()
and detailed message including BugCheck arguments will be printed to the.
debugger. This way we can identify an offending thread, set breakpoints in it,
and hit go to return to the spinning code to debug it further. Because.
KeBugCheckEx() is not called the .BugCheck directive will not return BugCheck.
information in this case. The arguments are already printed out to the kernel.
debugger. You can also retrieve them from a global variable via.
"dd watchdog!g_WdBugCheckData l5" (use dq on NT64).
On MP machines it is possible to hit a timeout when the spinning thread is.
interrupted by hardware interrupt and ISR or DPC routine is running at the time.
of the BugCheck (this is because the timeout's work item can be delivered and.
handled on the second CPU and the same time). If this is the case you will have.
to look deeper at the offending thread's stack (e.g. using dds) to determine.
spinning code which caused the timeout to occur.
Arguments:
Arg1: ffff8a88dcac9080, Pointer to a stuck thread object. Do .thread then kb on it to find.
the hung location.
Arg2: 0000000000000000, Pointer to a DEFERRED_WATCHDOG object.
Arg3: 0000000000000000, Pointer to offending driver name.
Arg4: 0000000000000000, Number of times "intercepted" BugCheck 0xEA was hit (see notes).
Debugging Details:
------------------
*** WARNING: Unable to verify timestamp for atikmdag.sys
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 9233.
Key : Analysis.DebugAnalysisManager
Value: Create.
Key : Analysis.Elapsed.mSec
Value: 63153.
Key : Analysis.IO.Other.Mb
Value: 0
Key : Analysis.IO.Read.Mb
Value: 0
Key : Analysis.IO.Write.Mb
Value: 0
Key : Analysis.Init.CPU.mSec
Value: 1124.
Key : Analysis.Init.Elapsed.mSec
Value: 5316.
Key : Analysis.Memory.CommitPeak.Mb
Value: 92.
Key : Bugcheck.Code.DumpHeader
Value: 0x100000ea.
Key : Bugcheck.Code.Register
Value: 0xea.
Key : WER.OS.Branch
Value: vb_release.
Key : WER.OS.Timestamp
Value: 2019-12-06T14:06:00Z
Key : WER.OS.Version
Value: 10.0.19041.1
FILE_IN_CAB: 042023-20687-01.dmp
BUGCHECK_CODE: ea.
BUGCHECK_P1: ffff8a88dcac9080.
BUGCHECK_P2: 0
BUGCHECK_P3: 0
BUGCHECK_P4: 0
FAULTING_THREAD: ffff8a88dcac9080.
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: System.
STACK_TEXT:
ffffb30b`2a214038 fffff807`1f1f451d : 00000000`000000ea ffff8a88`dcac9080 00000000`00000000 00000000`00000000 : nt!KeBugCheckEx
ffffb30b`2a214040 fffff807`1f1f45fe : ffffb30b`2a214118 fffff807`23a41c38 ffffb30b`2a214118 ffff8a88`e17a3000 : dxgkrnl!TdrTimedOperationBugcheckOnTimeout+0x45
ffffb30b`2a2140b0 fffff807`23a52043 : ffff8a88`e17a3000 00000000`00000000 ffff8a88`e17a3000 fffff807`23a41c10 : dxgkrnl!TdrTimedOperationDelay+0xce
ffffb30b`2a2140f0 ffff8a88`e17a3000 : 00000000`00000000 ffff8a88`e17a3000 fffff807`23a41c10 00000000`01c9c380 : atikmdag+0x42043
ffffb30b`2a2140f8 00000000`00000000 : ffff8a88`e17a3000 fffff807`23a41c10 00000000`01c9c380 fffff807`23870028 : 0xffff8a88`e17a3000
SYMBOL_NAME: dxgkrnl!TdrTimedOperationBugcheckOnTimeout+45
MODULE_NAME: dxgkrnl.
IMAGE_NAME: dxgkrnl.sys
IMAGE_VERSION: 10.0.19041.1865
STACK_COMMAND: .process /r /p 0xffff8a88dca93040; .thread 0xffff8a88dcac9080 ; kb.
FAILURE_BUCKET_ID: 0xEA_IMAGE_dxgkrnl.sys
OS_VERSION: 10.0.19041.1
BUILDLAB_STR: vb_release.
OSPLATFORM_TYPE: x64.
OSNAME: Windows 10.
FAILURE_ID_HASH: {ea458ad2-d5ab-aa6c-7a11-54653c70dfb8}
Followup: MachineOwner.
---------
THREAD_STUCK_IN_DEVICE_DRIVER_M (100000ea)
The device driver is spinning in an infinite loop, most likely waiting for.
hardware to become idle. This usually indicates problem with the hardware.
itself or with the device driver programming the hardware incorrectly.
If the kernel debugger is connected and running when watchdog detects a
timeout condition then DbgBreakPoint() will be called instead of KeBugCheckEx()
and detailed message including BugCheck arguments will be printed to the.
debugger. This way we can identify an offending thread, set breakpoints in it,
and hit go to return to the spinning code to debug it further. Because.
KeBugCheckEx() is not called the .BugCheck directive will not return BugCheck.
information in this case. The arguments are already printed out to the kernel.
debugger. You can also retrieve them from a global variable via.
"dd watchdog!g_WdBugCheckData l5" (use dq on NT64).
On MP machines it is possible to hit a timeout when the spinning thread is.
interrupted by hardware interrupt and ISR or DPC routine is running at the time.
of the BugCheck (this is because the timeout's work item can be delivered and.
handled on the second CPU and the same time). If this is the case you will have.
to look deeper at the offending thread's stack (e.g. using dds) to determine.
spinning code which caused the timeout to occur.
Arguments:
Arg1: ffffc50eff5be040, Pointer to a stuck thread object. Do .thread then kb on it to find.
the hung location.
Arg2: 0000000000000000, Pointer to a DEFERRED_WATCHDOG object.
Arg3: 0000000000000000, Pointer to offending driver name.
Arg4: 0000000000000000, Number of times "intercepted" BugCheck 0xEA was hit (see notes).
Debugging Details:
------------------
*** WARNING: Unable to verify timestamp for atikmdag.sys
*** WARNING: Unable to verify timestamp for win32k.sys
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 7156.
Key : Analysis.DebugAnalysisManager
Value: Create.
Key : Analysis.Elapsed.mSec
Value: 100509.
Key : Analysis.IO.Other.Mb
Value: 0
Key : Analysis.IO.Read.Mb
Value: 0
Key : Analysis.IO.Write.Mb
Value: 0
Key : Analysis.Init.CPU.mSec
Value: 811.
Key : Analysis.Init.Elapsed.mSec
Value: 3013.
Key : Analysis.Memory.CommitPeak.Mb
Value: 97.
Key : Bugcheck.Code.DumpHeader
Value: 0x100000ea.
Key : Bugcheck.Code.Register
Value: 0xea.
Key : WER.OS.Branch
Value: vb_release.
Key : WER.OS.Timestamp
Value: 2019-12-06T14:06:00Z
Key : WER.OS.Version
Value: 10.0.19041.1
FILE_IN_CAB: 042023-19343-01.dmp
BUGCHECK_CODE: ea.
BUGCHECK_P1: ffffc50eff5be040.
BUGCHECK_P2: 0
BUGCHECK_P3: 0
BUGCHECK_P4: 0
FAULTING_THREAD: ffffc50eff5be040.
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: System.
STACK_TEXT:
ffffc081`557ee038 fffff801`8fa4451d : 00000000`000000ea ffffc50e`ff5be040 00000000`00000000 00000000`00000000 : nt!KeBugCheckEx
ffffc081`557ee040 fffff801`8fa445fe : ffffc081`557ee118 fffff801`96281e88 ffffc081`557ee118 ffffc50e`fd215000 : dxgkrnl!TdrTimedOperationBugcheckOnTimeout+0x45
ffffc081`557ee0b0 fffff801`96292393 : ffffc50e`fd215000 00000000`00000000 ffffc50e`fd215000 fffff801`96281e60 : dxgkrnl!TdrTimedOperationDelay+0xce
ffffc081`557ee0f0 ffffc50e`fd215000 : 00000000`00000000 ffffc50e`fd215000 fffff801`96281e60 00000000`01c9c380 : atikmdag+0x42393
ffffc081`557ee0f8 00000000`00000000 : ffffc50e`fd215000 fffff801`96281e60 00000000`01c9c380 00000000`00000028 : 0xffffc50e`fd215000
SYMBOL_NAME: dxgkrnl!TdrTimedOperationBugcheckOnTimeout+45
MODULE_NAME: dxgkrnl.
IMAGE_NAME: dxgkrnl.sys
IMAGE_VERSION: 10.0.19041.1865
STACK_COMMAND: .process /r /p 0xffffc50ef848f040; .thread 0xffffc50eff5be040 ; kb.
FAILURE_BUCKET_ID: 0xEA_IMAGE_dxgkrnl.sys
OS_VERSION: 10.0.19041.1
BUILDLAB_STR: vb_release.
OSPLATFORM_TYPE: x64.
OSNAME: Windows 10.
FAILURE_ID_HASH: {ea458ad2-d5ab-aa6c-7a11-54653c70dfb8}
Followup: MachineOwner.
---------
: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
DRIVER_IRQL_NOT_LESS_OR_EQUAL (d1)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high. This is usually
caused by drivers using improper addresses.
If kernel debugger is available get stack backtrace.
Arguments:
Arg1: 0000000000000000, memory referenced
Arg2: 000000000000000b, IRQL
Arg3: 0000000000000008, value 0 = read operation, 1 = write operation
Arg4: 0000000000000000, address which referenced memory
Debugging Details:
------------------
*** WARNING: Unable to verify timestamp for atikmdag.sys
*** WARNING: Unable to verify timestamp for win32k.sys
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 4108
Key : Analysis.DebugAnalysisManager
Value: Create
Key : Analysis.Elapsed.mSec
Value: 85639
Key : Analysis.IO.Other.Mb
Value: 0
Key : Analysis.IO.Read.Mb
Value: 0
Key : Analysis.IO.Write.Mb
Value: 1
Key : Analysis.Init.CPU.mSec
Value: 296
Key : Analysis.Init.Elapsed.mSec
Value: 2691
Key : Analysis.Memory.CommitPeak.Mb
Value: 92
Key : Bugcheck.Code.DumpHeader
Value: 0xd1
Key : Bugcheck.Code.Register
Value: 0xa
Key : WER.OS.Branch
Value: vb_release
Key : WER.OS.Timestamp
Value: 2019-12-06T14:06:00Z
Key : WER.OS.Version
Value: 10.0.19041.1
FILE_IN_CAB: 042023-31359-01.dmp
BUGCHECK_CODE: d1
BUGCHECK_P1: 0
BUGCHECK_P2: b
BUGCHECK_P3: 8
BUGCHECK_P4: 0
READ_ADDRESS: fffff803568fb390: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
unable to get nt!MmSpecialPagesInUse
0000000000000000
PROCESS_NAME: System
CUSTOMER_CRASH_COUNT: 1
TRAP_FRAME: fffff8035c47eb80 -- (.trap 0xfffff8035c47eb80)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=fffff80419102ef0 rbx=0000000000000000 rcx=ffff9184067f0000
rdx=0000000000000003 rsi=0000000000000000 rdi=0000000000000000
rip=0000000000000000 rsp=fffff8035c47ed18 rbp=ffff918406f71980
r8=ffff918404d7e000 r9=fffff80418f00000 r10=ffff918406f671f0
r11=fffff8035c47ebf8 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei ng nz na pe nc
00000000`00000000 ?? ???
Resetting default scope
IP_IN_FREE_BLOCK: 0
FAILED_INSTRUCTION_ADDRESS:
+0
STACK_TEXT:
fffff803`5c47ed18 fffff804`18f37491 : ffff9184`06f719d0 fffff804`18f8c420 00000000`001e8480 00000000`00000000 : 0x0
fffff803`5c47ed20 ffff9184`06f719d0 : fffff804`18f8c420 00000000`001e8480 00000000`00000000 00000000`00000001 : atikmdag+0x37491
fffff803`5c47ed28 fffff804`18f8c420 : 00000000`001e8480 00000000`00000000 00000000`00000001 fffff804`18f854ff : 0xffff9184`06f719d0
fffff803`5c47ed30 00000000`001e8480 : 00000000`00000000 00000000`00000001 fffff804`18f854ff ffff9184`06f671f0 : atikmdag+0x8c420
fffff803`5c47ed38 00000000`00000000 : 00000000`00000001 fffff804`18f854ff ffff9184`06f671f0 fffff804`18f88b69 : 0x1e8480
STACK_COMMAND: .trap 0xfffff8035c47eb80 ; kb
SYMBOL_NAME: atikmdag+37491
MODULE_NAME: atikmdag
IMAGE_NAME: atikmdag.sys
BUCKET_ID_FUNC_OFFSET: 37491
FAILURE_BUCKET_ID: AV_CODE_AV_NULL_IP_atikmdag!unknown_function
OS_VERSION: 10.0.19041.1
BUILDLAB_STR: vb_release
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {20ec212d-07a8-e5e2-b5f1-885330edcb5d}
Followup: MachineOwner
---------
0: kd> !sysinfo machineid
sysinfo: could not find necessary interfaces.
sysinfo: note that mssmbios.sys must be loaded (XPSP2+).
0: kd> dx KiBugCheckDriver
Unimplemented error for KiBugCheckDriver
*************************************************************************
*** ***
*** ***
*** Either you specified an unqualified symbol, or your debugger ***
*** doesn't have full symbol information. Unqualified symbol ***
*** resolution is turned off by default. Please either specify a ***
*** fully qualified symbol module!symbolname, or enable resolution ***
*** of unqualified symbols by typing ".symopt- 100". Note that ***
*** enabling unqualified symbol resolution with network symbol ***
*** server shares in the symbol path may cause the debugger to ***
*** appear to hang for long periods of time when an incorrect ***
*** symbol name is typed or the network symbol server is down. ***
*** ***
*** For some commands to work properly, your symbol path ***
*** must point to .pdb files that have full type information. ***
*** ***
*** Certain .pdb files (such as the public OS symbols) do not ***
*** contain the required information. Contact the group that ***
*** provided you with these symbols if you need this command to ***
*** work. ***
*** ***
*** Type referenced: KiBugCheckDriver ***
*** ***
*************************************************************************
Error: Unable to bind name 'KiBugCheckDriver'
0: kd> ln 0000000000000000
Browse module
Set bu breakpoint
0: kd> !pool
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
The pool page you have specified is not in this dump.
0: kd> !pool 0000000000000000
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
The pool page you have specified is not in this dump.
0: kd> !irql
Debugger saved IRQL for processor 0x0 -- 11
--------
THREAD_STUCK_IN_DEVICE_DRIVER_M (100000ea)
The device driver is spinning in an infinite loop, most likely waiting for
hardware to become idle. This usually indicates problem with the hardware
itself or with the device driver programming the hardware incorrectly.
If the kernel debugger is connected and running when watchdog detects a
timeout condition then DbgBreakPoint() will be called instead of KeBugCheckEx()
and detailed message including BugCheck arguments will be printed to the
debugger. This way we can identify an offending thread, set breakpoints in it,
and hit go to return to the spinning code to debug it further. Because
KeBugCheckEx() is not called the .BugCheck directive will not return BugCheck
information in this case. The arguments are already printed out to the kernel
debugger. You can also retrieve them from a global variable via
"dd watchdog!g_WdBugCheckData l5" (use dq on NT64).
On MP machines it is possible to hit a timeout when the spinning thread is
interrupted by hardware interrupt and ISR or DPC routine is running at the time
of the BugCheck (this is because the timeout's work item can be delivered and
handled on the second CPU and the same time). If this is the case you will have
to look deeper at the offending thread's stack (e.g. using dds) to determine
spinning code which caused the timeout to occur.
Arguments:
Arg1: ffffc50eff5be040, Pointer to a stuck thread object. Do .thread then kb on it to find
the hung location.
Arg2: 0000000000000000, Pointer to a DEFERRED_WATCHDOG object.
Arg3: 0000000000000000, Pointer to offending driver name.
Arg4: 0000000000000000, Number of times "intercepted" BugCheck 0xEA was hit (see notes).
Debugging Details:
------------------
*** WARNING: Unable to verify timestamp for atikmdag.sys
*** WARNING: Unable to verify timestamp for win32k.sys
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 3952
Key : Analysis.DebugAnalysisManager
Value: Create
Key : Analysis.Elapsed.mSec
Value: 102793
Key : Analysis.IO.Other.Mb
Value: 2
Key : Analysis.IO.Read.Mb
Value: 0
Key : Analysis.IO.Write.Mb
Value: 3
Key : Analysis.Init.CPU.mSec
Value: 421
Key : Analysis.Init.Elapsed.mSec
Value: 7637
Key : Analysis.Memory.CommitPeak.Mb
Value: 93
Key : Bugcheck.Code.DumpHeader
Value: 0x100000ea
Key : Bugcheck.Code.Register
Value: 0xea
Key : WER.OS.Branch
Value: vb_release
Key : WER.OS.Timestamp
Value: 2019-12-06T14:06:00Z
Key : WER.OS.Version
Value: 10.0.19041.1
FILE_IN_CAB: 042023-19343-01.dmp
BUGCHECK_CODE: ea
BUGCHECK_P1: ffffc50eff5be040
BUGCHECK_P2: 0
BUGCHECK_P3: 0
BUGCHECK_P4: 0
FAULTING_THREAD: ffffc50eff5be040
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: System
STACK_TEXT:
ffffc081`557ee038 fffff801`8fa4451d : 00000000`000000ea ffffc50e`ff5be040 00000000`00000000 00000000`00000000 : nt!KeBugCheckEx
ffffc081`557ee040 fffff801`8fa445fe : ffffc081`557ee118 fffff801`96281e88 ffffc081`557ee118 ffffc50e`fd215000 : dxgkrnl!TdrTimedOperationBugcheckOnTimeout+0x45
ffffc081`557ee0b0 fffff801`96292393 : ffffc50e`fd215000 00000000`00000000 ffffc50e`fd215000 fffff801`96281e60 : dxgkrnl!TdrTimedOperationDelay+0xce
ffffc081`557ee0f0 ffffc50e`fd215000 : 00000000`00000000 ffffc50e`fd215000 fffff801`96281e60 00000000`01c9c380 : atikmdag+0x42393
ffffc081`557ee0f8 00000000`00000000 : ffffc50e`fd215000 fffff801`96281e60 00000000`01c9c380 00000000`00000028 : 0xffffc50e`fd215000
SYMBOL_NAME: dxgkrnl!TdrTimedOperationBugcheckOnTimeout+45
MODULE_NAME: dxgkrnl
IMAGE_NAME: dxgkrnl.sys
IMAGE_VERSION: 10.0.19041.1865
STACK_COMMAND: .process /r /p 0xffffc50ef848f040; .thread 0xffffc50eff5be040 ; kb
FAILURE_BUCKET_ID: 0xEA_IMAGE_dxgkrnl.sys
OS_VERSION: 10.0.19041.1
BUILDLAB_STR: vb_release
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {ea458ad2-d5ab-aa6c-7a11-54653c70dfb8}
Followup: MachineOwner
---------
2: kd> lm
start end module name
fffff801`7e650000 fffff801`7e8df000 mcupdate_GenuineIntel # (pdb symbols) C:\ProgramData\Dbg\sym\mcupdate_GenuineIntel.pdb\2C3A3196EBAFC0B94B0D69BAE95496D91\mcupdate_GenuineIntel.pdb
fffff801`7e8e0000 fffff801`7e8e6000 hal (deferred)
fffff801`7e8f0000 fffff801`7e8fb000 kd (deferred)
fffff801`7e900000 fffff801`7e927000 tm (deferred)
fffff801`7e930000 fffff801`7e99b000 CLFS (deferred)
fffff801`7e9a0000 fffff801`7e9ba000 PSHED (deferred)
fffff801`7e9c0000 fffff801`7e9cb000 BOOTVID (deferred)
fffff801`7e9d0000 fffff801`7ea3d000 FLTMGR (deferred)
fffff801`7ea40000 fffff801`7ea4e000 cmimcext (deferred)
fffff801`7ec00000 fffff801`7ed84000 BTHport (deferred)
fffff801`7ed90000 fffff801`7ee71000 dxgmms2 (deferred)
fffff801`7ee90000 fffff801`7eee4000 usbvideo (deferred)
fffff801`7eef0000 fffff801`7ef0b000 monitor (deferred)
fffff801`7ef20000 fffff801`7ef2f000 dump_diskdump (deferred)
fffff801`7ef70000 fffff801`7efa2000 dump_storahci (deferred)
fffff801`7efd0000 fffff801`7efed000 dump_dumpfve (deferred)
fffff801`7eff0000 fffff801`7f026000 wcifs (deferred)
fffff801`7f060000 fffff801`7f09f000 HIDCLASS (deferred)
fffff801`7f0a0000 fffff801`7f0b3000 HIDPARSE (deferred)
fffff801`7f0c0000 fffff801`7f0d0000 mouhid (deferred)
fffff801`7f0e0000 fffff801`7f0f1000 kbdhid (deferred)
fffff801`7f100000 fffff801`7f121000 BTHUSB (deferred)
fffff801`7f130000 fffff801`7f1a3000 dxgmms1 (deferred)
fffff801`7f1b0000 fffff801`7f1c4000 mmcss (deferred)
fffff801`7f1d0000 fffff801`7f1f9000 luafv (deferred)
fffff801`7f200000 fffff801`80246000 nt (pdb symbols) C:\ProgramData\Dbg\sym\ntkrnlmp.pdb\68A17FAF3012B7846079AEECDBE0A5831\ntkrnlmp.pdb
fffff801`84000000 fffff801`84117000 clipsp (deferred)
fffff801`84120000 fffff801`84149000 ksecdd (deferred)
fffff801`84150000 fffff801`841b1000 msrpc (deferred)
fffff801`841c0000 fffff801`841d1000 werkernel (deferred)
fffff801`841e0000 fffff801`841ec000 ntosext (deferred)
fffff801`841f0000 fffff801`842d7000 CI (deferred)
fffff801`842e0000 fffff801`8439b000 cng (deferred)
fffff801`843a0000 fffff801`84471000 Wdf01000 (deferred)
fffff801`84480000 fffff801`84493000 WDFLDR (deferred)
fffff801`844a0000 fffff801`844af000 SleepStudyHelper (deferred)
fffff801`844b0000 fffff801`844c1000 WppRecorder (deferred)
fffff801`844d0000 fffff801`844f6000 acpiex (deferred)
fffff801`84500000 fffff801`8451a000 SgrmAgent (deferred)
fffff801`84520000 fffff801`845ec000 ACPI (deferred)
fffff801`845f0000 fffff801`845fc000 WMILIB (deferred)
fffff801`84620000 fffff801`8468b000 intelpep (deferred)
fffff801`84690000 fffff801`846a7000 WindowsTrustedRT (deferred)
fffff801`846b0000 fffff801`846bb000 IntelTA (deferred)
fffff801`846c0000 fffff801`846cb000 WindowsTrustedRTProxy (deferred)
fffff801`846d0000 fffff801`846e4000 pcw (deferred)
fffff801`846f0000 fffff801`846fb000 msisadrv (deferred)
fffff801`84700000 fffff801`84777000 pci (deferred)
fffff801`84780000 fffff801`84795000 vdrvroot (deferred)
fffff801`847a0000 fffff801`847cf000 pdc (deferred)
fffff801`847d0000 fffff801`847e9000 CEA (deferred)
fffff801`847f0000 fffff801`847fd000 Fs_Rec (deferred)
fffff801`84800000 fffff801`84831000 partmgr (deferred)
fffff801`84840000 fffff801`848ec000 spaceport (deferred)
fffff801`848f0000 fffff801`84909000 volmgr (deferred)
fffff801`84910000 fffff801`84973000 volmgrx (deferred)
fffff801`84980000 fffff801`8499e000 mountmgr (deferred)
fffff801`849a0000 fffff801`849d2000 storahci (deferred)
fffff801`849e0000 fffff801`84a95000 storport (deferred)
fffff801`84aa0000 fffff801`84abc000 EhStorClass (deferred)
fffff801`84ac0000 fffff801`84ada000 fileinfo (deferred)
fffff801`84ae0000 fffff801`84b20000 Wof (deferred)
fffff801`84b30000 fffff801`84b8a000 WdFilter (deferred)
fffff801`84b90000 fffff801`84e67000 Ntfs (deferred)
fffff801`84e70000 fffff801`84fdf000 ndis (deferred)
fffff801`84fe0000 fffff801`85078000 NETIO (deferred)
fffff801`85080000 fffff801`850b2000 ksecpkg (deferred)
fffff801`850c0000 fffff801`853ac000 tcpip (deferred)
fffff801`853b0000 fffff801`8542f000 fwpkclnt (deferred)
fffff801`85430000 fffff801`85460000 wfplwfs (deferred)
fffff801`85470000 fffff801`85483000 amdkmpfd (deferred)
fffff801`85490000 fffff801`85558000 fvevol (deferred)
fffff801`85560000 fffff801`8556b000 volume (deferred)
fffff801`85570000 fffff801`855dd000 volsnap (deferred)
fffff801`855e0000 fffff801`85630000 rdyboost (deferred)
fffff801`85640000 fffff801`85666000 mup (deferred)
fffff801`85670000 fffff801`85682000 iorate (deferred)
fffff801`856b0000 fffff801`856cf000 disk (deferred)
fffff801`856d0000 fffff801`8573f000 CLASSPNP (deferred)
fffff801`8fa00000 fffff801`8fdaa000 dxgkrnl (pdb symbols) C:\ProgramData\Dbg\sym\dxgkrnl.pdb\31824B205114B2353ABBE43FF0D337EA1\dxgkrnl.pdb
fffff801`8fdb0000 fffff801`8fdc8000 watchdog (deferred)
fffff801`8fdd0000 fffff801`8fde6000 BasicDisplay (deferred)
fffff801`8fdf0000 fffff801`8fe01000 BasicRender (deferred)
fffff801`8fe10000 fffff801`8fe2c000 Npfs (deferred)
fffff801`8fe30000 fffff801`8fe41000 Msfs (deferred)
fffff801`8fe50000 fffff801`8fe6e000 CimFS (deferred)
fffff801`8fe70000 fffff801`8fe92000 tdx (deferred)
fffff801`8fea0000 fffff801`8feb0000 TDI (deferred)
fffff801`8fec0000 fffff801`8fef4000 usbccgp (deferred)
fffff801`8ff20000 fffff801`8ff3e000 crashdmp (deferred)
fffff801`8ff40000 fffff801`8ff70000 cdrom (deferred)
fffff801`8ff80000 fffff801`8ff95000 filecrypt (deferred)
fffff801`8ffa0000 fffff801`8ffae000 tbs (deferred)
fffff801`8ffb0000 fffff801`8ffba000 Null (deferred)
fffff801`8ffc0000 fffff801`8ffca000 Beep (deferred)
fffff801`91000000 fffff801`910a1000 Vid (deferred)
fffff801`910b0000 fffff801`910d1000 winhvr (deferred)
fffff801`910e0000 fffff801`9115b000 rdbss (deferred)
fffff801`91160000 fffff801`91172000 nsiproxy (deferred)
fffff801`91180000 fffff801`9118e000 npsvctrig (deferred)
fffff801`91190000 fffff801`911a0000 mssmbios # (pdb symbols) C:\ProgramData\Dbg\sym\mssmbios.pdb\53ADC03D875B3F78AC94CE4D75054C461\mssmbios.pdb
fffff801`911b0000 fffff801`911ba000 gpuenergydrv (deferred)
fffff801`911c0000 fffff801`911ec000 dfsc (deferred)
fffff801`91210000 fffff801`9127c000 fastfat (deferred)
fffff801`91280000 fffff801`91297000 bam (deferred)
fffff801`912a0000 fffff801`912ee000 ahcache (deferred)
fffff801`912f0000 fffff801`91302000 CompositeBus (deferred)
fffff801`91310000 fffff801`9131d000 kdnic (deferred)
fffff801`91320000 fffff801`91335000 umbus (deferred)
fffff801`91340000 fffff801`91355000 CAD (deferred)
fffff801`91360000 fffff801`91409000 atikmpag (deferred)
fffff801`91410000 fffff801`91837000 athw8x (deferred)
fffff801`91840000 fffff801`918c5000 usbhub (deferred)
fffff801`918d0000 fffff801`9193f000 HdAudio (deferred)
fffff801`91940000 fffff801`9194f000 ksthunk (deferred)
fffff801`91950000 fffff801`919f3000 UsbHub3 (deferred)
fffff801`91a00000 fffff801`91a12000 hidusb (deferred)
fffff801`91a20000 fffff801`91a7c000 netbt (deferred)
fffff801`91a80000 fffff801`91a94000 afunix (deferred)
fffff801`91aa0000 fffff801`91b45000 afd (deferred)
fffff801`91b50000 fffff801`91b6a000 vwififlt (deferred)
fffff801`91b70000 fffff801`91b9b000 pacer (deferred)
fffff801`91ba0000 fffff801`91bb4000 ndiscap (deferred)
fffff801`91bc0000 fffff801`91bd4000 netbios (deferred)
fffff801`95e00000 fffff801`95e44000 ucx01000 (deferred)
fffff801`95e50000 fffff801`95e6a000 usbehci (deferred)
fffff801`95e70000 fffff801`95ee9000 USBPORT (deferred)
fffff801`95ef0000 fffff801`95f15000 HDAudBus (deferred)
fffff801`95f20000 fffff801`95f86000 portcls (deferred)
fffff801`95f90000 fffff801`95fb1000 drmk (deferred)
fffff801`95fc0000 fffff801`96036000 ks (deferred)
fffff801`96040000 fffff801`960ed000 rt640x64 (deferred)
fffff801`960f0000 fffff801`960fe000 vwifibus (deferred)
fffff801`96100000 fffff801`96121000 i8042prt (deferred)
fffff801`96130000 fffff801`96143000 mouclass (deferred)
fffff801`96150000 fffff801`96164000 kbdclass (deferred)
fffff801`96170000 fffff801`9617f000 CmBatt (deferred)
fffff801`96180000 fffff801`96190000 BATTC (deferred)
fffff801`961a0000 fffff801`961ac000 wmiacpi (deferred)
fffff801`961b0000 fffff801`961f1000 intelppm (deferred)
fffff801`96200000 fffff801`9620d000 NdisVirtualBus (deferred)
fffff801`96210000 fffff801`9621c000 swenum (deferred)
fffff801`96220000 fffff801`9622c000 iwdbus (deferred)
fffff801`96230000 fffff801`9623e000 rdpbus (deferred)
fffff801`96240000 fffff801`9624e000 USBD (deferred)
fffff801`96250000 fffff801`9775f000 atikmdag T (no symbols)
fffff801`97760000 fffff801`977fe000 USBXHCI (deferred)
fffff801`a1600000 fffff801`a1627000 bindflt (deferred)
fffff801`a1630000 fffff801`a1640000 MSKSSRV (deferred)
fffff801`a1650000 fffff801`a168d000 rfcomm (deferred)
fffff801`a1690000 fffff801`a16b2000 BthEnum (deferred)
fffff801`a16c0000 fffff801`a16e6000 bthpan (deferred)
fffff801`a16f0000 fffff801`a1708000 lltdio (deferred)
fffff801`a1710000 fffff801`a1728000 mslldp (deferred)
fffff801`a1730000 fffff801`a174b000 rspndr (deferred)
fffff801`a1750000 fffff801`a180f000 nwifi (deferred)
fffff801`a1810000 fffff801`a1828000 ndisuio (deferred)
fffff801`a1830000 fffff801`a1886000 msquic (deferred)
fffff801`a1930000 fffff801`a19b1000 cldflt (deferred)
fffff801`a19c0000 fffff801`a19da000 storqosflt (deferred)
fffff801`a8800000 fffff801`a8852000 mrxsmb10 (deferred)
fffff801`a8860000 fffff801`a8927000 srv2 (deferred)
fffff801`a8930000 fffff801`a8957000 Ndu (deferred)
fffff801`a8960000 fffff801`a8a37000 peauth (deferred)
fffff801`a8a40000 fffff801`a8a55000 tcpipreg (deferred)
fffff801`a8a60000 fffff801`a8a72000 WdNisDrv (deferred)
fffff801`a94a0000 fffff801`a9627000 HTTP (deferred)
fffff801`a9630000 fffff801`a964a000 mpsdrv (deferred)
fffff801`a9650000 fffff801`a9675000 bowser (deferred)
fffff801`a9680000 fffff801`a9715000 mrxsmb (deferred)
fffff801`a9720000 fffff801`a9766000 mrxsmb20 (deferred)
fffff801`a9770000 fffff801`a9783000 vwifimp (deferred)
fffff801`a9790000 fffff801`a97e6000 srvnet (deferred)
fffff98e`db200000 fffff98e`db4d3000 win32kbase (deferred)
fffff98e`db4e0000 fffff98e`db895000 win32kfull (deferred)
fffff98e`db8a0000 fffff98e`db8e9000 cdd (deferred)
fffff98e`dbee0000 fffff98e`dbf7a000 win32k T (no symbols)
Unloaded modules:
fffff801`7ee80000 fffff801`7ee8c000 WdmCompanion
fffff801`911f0000 fffff801`9120c000 dam.sys
fffff801`84600000 fffff801`84611000 WdBoot.sys
fffff801`85690000 fffff801`856a1000 hwpolicy.sys
Ekran kartı hakkı rahmetine kavuşmuş yüksek ihtimal.@Recep Baltaş hocam bir baksın yanlışım olabilir. Ama sorununuz bir donanımsal gibi görünüyor.
Kod:: kd> !analyze -v ******************************************************************************* * * * Bugcheck Analysis * * * ******************************************************************************* DRIVER_IRQL_NOT_LESS_OR_EQUAL (d1) An attempt was made to access a pageable (or completely invalid) address at an interrupt request level (IRQL) that is too high. This is usually caused by drivers using improper addresses. If kernel debugger is available get stack backtrace. Arguments: Arg1: 0000000000000000, memory referenced Arg2: 000000000000000b, IRQL Arg3: 0000000000000008, value 0 = read operation, 1 = write operation Arg4: 0000000000000000, address which referenced memory Debugging Details: ------------------ *** WARNING: Unable to verify timestamp for atikmdag.sys *** WARNING: Unable to verify timestamp for win32k.sys KEY_VALUES_STRING: 1 Key : Analysis.CPU.mSec Value: 4108 Key : Analysis.DebugAnalysisManager Value: Create Key : Analysis.Elapsed.mSec Value: 85639 Key : Analysis.IO.Other.Mb Value: 0 Key : Analysis.IO.Read.Mb Value: 0 Key : Analysis.IO.Write.Mb Value: 1 Key : Analysis.Init.CPU.mSec Value: 296 Key : Analysis.Init.Elapsed.mSec Value: 2691 Key : Analysis.Memory.CommitPeak.Mb Value: 92 Key : Bugcheck.Code.DumpHeader Value: 0xd1 Key : Bugcheck.Code.Register Value: 0xa Key : WER.OS.Branch Value: vb_release Key : WER.OS.Timestamp Value: 2019-12-06T14:06:00Z Key : WER.OS.Version Value: 10.0.19041.1 FILE_IN_CAB: 042023-31359-01.dmp BUGCHECK_CODE: d1 BUGCHECK_P1: 0 BUGCHECK_P2: b BUGCHECK_P3: 8 BUGCHECK_P4: 0 READ_ADDRESS: fffff803568fb390: Unable to get MiVisibleState Unable to get NonPagedPoolStart Unable to get NonPagedPoolEnd Unable to get PagedPoolStart Unable to get PagedPoolEnd unable to get nt!MmSpecialPagesInUse 0000000000000000 PROCESS_NAME: System CUSTOMER_CRASH_COUNT: 1 TRAP_FRAME: fffff8035c47eb80 -- (.trap 0xfffff8035c47eb80) NOTE: The trap frame does not contain all registers. Some register values may be zeroed or incorrect. rax=fffff80419102ef0 rbx=0000000000000000 rcx=ffff9184067f0000 rdx=0000000000000003 rsi=0000000000000000 rdi=0000000000000000 rip=0000000000000000 rsp=fffff8035c47ed18 rbp=ffff918406f71980 r8=ffff918404d7e000 r9=fffff80418f00000 r10=ffff918406f671f0 r11=fffff8035c47ebf8 r12=0000000000000000 r13=0000000000000000 r14=0000000000000000 r15=0000000000000000 iopl=0 nv up ei ng nz na pe nc 00000000`00000000 ?? ??? Resetting default scope IP_IN_FREE_BLOCK: 0 FAILED_INSTRUCTION_ADDRESS: +0 STACK_TEXT: fffff803`5c47ed18 fffff804`18f37491 : ffff9184`06f719d0 fffff804`18f8c420 00000000`001e8480 00000000`00000000 : 0x0 fffff803`5c47ed20 ffff9184`06f719d0 : fffff804`18f8c420 00000000`001e8480 00000000`00000000 00000000`00000001 : atikmdag+0x37491 fffff803`5c47ed28 fffff804`18f8c420 : 00000000`001e8480 00000000`00000000 00000000`00000001 fffff804`18f854ff : 0xffff9184`06f719d0 fffff803`5c47ed30 00000000`001e8480 : 00000000`00000000 00000000`00000001 fffff804`18f854ff ffff9184`06f671f0 : atikmdag+0x8c420 fffff803`5c47ed38 00000000`00000000 : 00000000`00000001 fffff804`18f854ff ffff9184`06f671f0 fffff804`18f88b69 : 0x1e8480 STACK_COMMAND: .trap 0xfffff8035c47eb80 ; kb SYMBOL_NAME: atikmdag+37491 MODULE_NAME: atikmdag IMAGE_NAME: atikmdag.sys BUCKET_ID_FUNC_OFFSET: 37491 FAILURE_BUCKET_ID: AV_CODE_AV_NULL_IP_atikmdag!unknown_function OS_VERSION: 10.0.19041.1 BUILDLAB_STR: vb_release OSPLATFORM_TYPE: x64 OSNAME: Windows 10 FAILURE_ID_HASH: {20ec212d-07a8-e5e2-b5f1-885330edcb5d} Followup: MachineOwner --------- 0: kd> !sysinfo machineid sysinfo: could not find necessary interfaces. sysinfo: note that mssmbios.sys must be loaded (XPSP2+). 0: kd> dx KiBugCheckDriver Unimplemented error for KiBugCheckDriver ************************************************************************* *** *** *** *** *** Either you specified an unqualified symbol, or your debugger *** *** doesn't have full symbol information. Unqualified symbol *** *** resolution is turned off by default. Please either specify a *** *** fully qualified symbol module!symbolname, or enable resolution *** *** of unqualified symbols by typing ".symopt- 100". Note that *** *** enabling unqualified symbol resolution with network symbol *** *** server shares in the symbol path may cause the debugger to *** *** appear to hang for long periods of time when an incorrect *** *** symbol name is typed or the network symbol server is down. *** *** *** *** For some commands to work properly, your symbol path *** *** must point to .pdb files that have full type information. *** *** *** *** Certain .pdb files (such as the public OS symbols) do not *** *** contain the required information. Contact the group that *** *** provided you with these symbols if you need this command to *** *** work. *** *** *** *** Type referenced: KiBugCheckDriver *** *** *** ************************************************************************* Error: Unable to bind name 'KiBugCheckDriver' 0: kd> ln 0000000000000000 Browse module Set bu breakpoint 0: kd> !pool Unable to get NonPagedPoolStart Unable to get NonPagedPoolEnd Unable to get PagedPoolStart Unable to get PagedPoolEnd The pool page you have specified is not in this dump. 0: kd> !pool 0000000000000000 Unable to get NonPagedPoolStart Unable to get NonPagedPoolEnd Unable to get PagedPoolStart Unable to get PagedPoolEnd The pool page you have specified is not in this dump. 0: kd> !irql Debugger saved IRQL for processor 0x0 -- 11 -------- THREAD_STUCK_IN_DEVICE_DRIVER_M (100000ea) The device driver is spinning in an infinite loop, most likely waiting for hardware to become idle. This usually indicates problem with the hardware itself or with the device driver programming the hardware incorrectly. If the kernel debugger is connected and running when watchdog detects a timeout condition then DbgBreakPoint() will be called instead of KeBugCheckEx() and detailed message including BugCheck arguments will be printed to the debugger. This way we can identify an offending thread, set breakpoints in it, and hit go to return to the spinning code to debug it further. Because KeBugCheckEx() is not called the .BugCheck directive will not return BugCheck information in this case. The arguments are already printed out to the kernel debugger. You can also retrieve them from a global variable via "dd watchdog!g_WdBugCheckData l5" (use dq on NT64). On MP machines it is possible to hit a timeout when the spinning thread is interrupted by hardware interrupt and ISR or DPC routine is running at the time of the BugCheck (this is because the timeout's work item can be delivered and handled on the second CPU and the same time). If this is the case you will have to look deeper at the offending thread's stack (e.g. using dds) to determine spinning code which caused the timeout to occur. Arguments: Arg1: ffffc50eff5be040, Pointer to a stuck thread object. Do .thread then kb on it to find the hung location. Arg2: 0000000000000000, Pointer to a DEFERRED_WATCHDOG object. Arg3: 0000000000000000, Pointer to offending driver name. Arg4: 0000000000000000, Number of times "intercepted" BugCheck 0xEA was hit (see notes). Debugging Details: ------------------ *** WARNING: Unable to verify timestamp for atikmdag.sys *** WARNING: Unable to verify timestamp for win32k.sys KEY_VALUES_STRING: 1 Key : Analysis.CPU.mSec Value: 3952 Key : Analysis.DebugAnalysisManager Value: Create Key : Analysis.Elapsed.mSec Value: 102793 Key : Analysis.IO.Other.Mb Value: 2 Key : Analysis.IO.Read.Mb Value: 0 Key : Analysis.IO.Write.Mb Value: 3 Key : Analysis.Init.CPU.mSec Value: 421 Key : Analysis.Init.Elapsed.mSec Value: 7637 Key : Analysis.Memory.CommitPeak.Mb Value: 93 Key : Bugcheck.Code.DumpHeader Value: 0x100000ea Key : Bugcheck.Code.Register Value: 0xea Key : WER.OS.Branch Value: vb_release Key : WER.OS.Timestamp Value: 2019-12-06T14:06:00Z Key : WER.OS.Version Value: 10.0.19041.1 FILE_IN_CAB: 042023-19343-01.dmp BUGCHECK_CODE: ea BUGCHECK_P1: ffffc50eff5be040 BUGCHECK_P2: 0 BUGCHECK_P3: 0 BUGCHECK_P4: 0 FAULTING_THREAD: ffffc50eff5be040 CUSTOMER_CRASH_COUNT: 1 PROCESS_NAME: System STACK_TEXT: ffffc081`557ee038 fffff801`8fa4451d : 00000000`000000ea ffffc50e`ff5be040 00000000`00000000 00000000`00000000 : nt!KeBugCheckEx ffffc081`557ee040 fffff801`8fa445fe : ffffc081`557ee118 fffff801`96281e88 ffffc081`557ee118 ffffc50e`fd215000 : dxgkrnl!TdrTimedOperationBugcheckOnTimeout+0x45 ffffc081`557ee0b0 fffff801`96292393 : ffffc50e`fd215000 00000000`00000000 ffffc50e`fd215000 fffff801`96281e60 : dxgkrnl!TdrTimedOperationDelay+0xce ffffc081`557ee0f0 ffffc50e`fd215000 : 00000000`00000000 ffffc50e`fd215000 fffff801`96281e60 00000000`01c9c380 : atikmdag+0x42393 ffffc081`557ee0f8 00000000`00000000 : ffffc50e`fd215000 fffff801`96281e60 00000000`01c9c380 00000000`00000028 : 0xffffc50e`fd215000 SYMBOL_NAME: dxgkrnl!TdrTimedOperationBugcheckOnTimeout+45 MODULE_NAME: dxgkrnl IMAGE_NAME: dxgkrnl.sys IMAGE_VERSION: 10.0.19041.1865 STACK_COMMAND: .process /r /p 0xffffc50ef848f040; .thread 0xffffc50eff5be040 ; kb FAILURE_BUCKET_ID: 0xEA_IMAGE_dxgkrnl.sys OS_VERSION: 10.0.19041.1 BUILDLAB_STR: vb_release OSPLATFORM_TYPE: x64 OSNAME: Windows 10 FAILURE_ID_HASH: {ea458ad2-d5ab-aa6c-7a11-54653c70dfb8} Followup: MachineOwner --------- 2: kd> lm start end module name fffff801`7e650000 fffff801`7e8df000 mcupdate_GenuineIntel # (pdb symbols) C:\ProgramData\Dbg\sym\mcupdate_GenuineIntel.pdb\2C3A3196EBAFC0B94B0D69BAE95496D91\mcupdate_GenuineIntel.pdb fffff801`7e8e0000 fffff801`7e8e6000 hal (deferred) fffff801`7e8f0000 fffff801`7e8fb000 kd (deferred) fffff801`7e900000 fffff801`7e927000 tm (deferred) fffff801`7e930000 fffff801`7e99b000 CLFS (deferred) fffff801`7e9a0000 fffff801`7e9ba000 PSHED (deferred) fffff801`7e9c0000 fffff801`7e9cb000 BOOTVID (deferred) fffff801`7e9d0000 fffff801`7ea3d000 FLTMGR (deferred) fffff801`7ea40000 fffff801`7ea4e000 cmimcext (deferred) fffff801`7ec00000 fffff801`7ed84000 BTHport (deferred) fffff801`7ed90000 fffff801`7ee71000 dxgmms2 (deferred) fffff801`7ee90000 fffff801`7eee4000 usbvideo (deferred) fffff801`7eef0000 fffff801`7ef0b000 monitor (deferred) fffff801`7ef20000 fffff801`7ef2f000 dump_diskdump (deferred) fffff801`7ef70000 fffff801`7efa2000 dump_storahci (deferred) fffff801`7efd0000 fffff801`7efed000 dump_dumpfve (deferred) fffff801`7eff0000 fffff801`7f026000 wcifs (deferred) fffff801`7f060000 fffff801`7f09f000 HIDCLASS (deferred) fffff801`7f0a0000 fffff801`7f0b3000 HIDPARSE (deferred) fffff801`7f0c0000 fffff801`7f0d0000 mouhid (deferred) fffff801`7f0e0000 fffff801`7f0f1000 kbdhid (deferred) fffff801`7f100000 fffff801`7f121000 BTHUSB (deferred) fffff801`7f130000 fffff801`7f1a3000 dxgmms1 (deferred) fffff801`7f1b0000 fffff801`7f1c4000 mmcss (deferred) fffff801`7f1d0000 fffff801`7f1f9000 luafv (deferred) fffff801`7f200000 fffff801`80246000 nt (pdb symbols) C:\ProgramData\Dbg\sym\ntkrnlmp.pdb\68A17FAF3012B7846079AEECDBE0A5831\ntkrnlmp.pdb fffff801`84000000 fffff801`84117000 clipsp (deferred) fffff801`84120000 fffff801`84149000 ksecdd (deferred) fffff801`84150000 fffff801`841b1000 msrpc (deferred) fffff801`841c0000 fffff801`841d1000 werkernel (deferred) fffff801`841e0000 fffff801`841ec000 ntosext (deferred) fffff801`841f0000 fffff801`842d7000 CI (deferred) fffff801`842e0000 fffff801`8439b000 cng (deferred) fffff801`843a0000 fffff801`84471000 Wdf01000 (deferred) fffff801`84480000 fffff801`84493000 WDFLDR (deferred) fffff801`844a0000 fffff801`844af000 SleepStudyHelper (deferred) fffff801`844b0000 fffff801`844c1000 WppRecorder (deferred) fffff801`844d0000 fffff801`844f6000 acpiex (deferred) fffff801`84500000 fffff801`8451a000 SgrmAgent (deferred) fffff801`84520000 fffff801`845ec000 ACPI (deferred) fffff801`845f0000 fffff801`845fc000 WMILIB (deferred) fffff801`84620000 fffff801`8468b000 intelpep (deferred) fffff801`84690000 fffff801`846a7000 WindowsTrustedRT (deferred) fffff801`846b0000 fffff801`846bb000 IntelTA (deferred) fffff801`846c0000 fffff801`846cb000 WindowsTrustedRTProxy (deferred) fffff801`846d0000 fffff801`846e4000 pcw (deferred) fffff801`846f0000 fffff801`846fb000 msisadrv (deferred) fffff801`84700000 fffff801`84777000 pci (deferred) fffff801`84780000 fffff801`84795000 vdrvroot (deferred) fffff801`847a0000 fffff801`847cf000 pdc (deferred) fffff801`847d0000 fffff801`847e9000 CEA (deferred) fffff801`847f0000 fffff801`847fd000 Fs_Rec (deferred) fffff801`84800000 fffff801`84831000 partmgr (deferred) fffff801`84840000 fffff801`848ec000 spaceport (deferred) fffff801`848f0000 fffff801`84909000 volmgr (deferred) fffff801`84910000 fffff801`84973000 volmgrx (deferred) fffff801`84980000 fffff801`8499e000 mountmgr (deferred) fffff801`849a0000 fffff801`849d2000 storahci (deferred) fffff801`849e0000 fffff801`84a95000 storport (deferred) fffff801`84aa0000 fffff801`84abc000 EhStorClass (deferred) fffff801`84ac0000 fffff801`84ada000 fileinfo (deferred) fffff801`84ae0000 fffff801`84b20000 Wof (deferred) fffff801`84b30000 fffff801`84b8a000 WdFilter (deferred) fffff801`84b90000 fffff801`84e67000 Ntfs (deferred) fffff801`84e70000 fffff801`84fdf000 ndis (deferred) fffff801`84fe0000 fffff801`85078000 NETIO (deferred) fffff801`85080000 fffff801`850b2000 ksecpkg (deferred) fffff801`850c0000 fffff801`853ac000 tcpip (deferred) fffff801`853b0000 fffff801`8542f000 fwpkclnt (deferred) fffff801`85430000 fffff801`85460000 wfplwfs (deferred) fffff801`85470000 fffff801`85483000 amdkmpfd (deferred) fffff801`85490000 fffff801`85558000 fvevol (deferred) fffff801`85560000 fffff801`8556b000 volume (deferred) fffff801`85570000 fffff801`855dd000 volsnap (deferred) fffff801`855e0000 fffff801`85630000 rdyboost (deferred) fffff801`85640000 fffff801`85666000 mup (deferred) fffff801`85670000 fffff801`85682000 iorate (deferred) fffff801`856b0000 fffff801`856cf000 disk (deferred) fffff801`856d0000 fffff801`8573f000 CLASSPNP (deferred) fffff801`8fa00000 fffff801`8fdaa000 dxgkrnl (pdb symbols) C:\ProgramData\Dbg\sym\dxgkrnl.pdb\31824B205114B2353ABBE43FF0D337EA1\dxgkrnl.pdb fffff801`8fdb0000 fffff801`8fdc8000 watchdog (deferred) fffff801`8fdd0000 fffff801`8fde6000 BasicDisplay (deferred) fffff801`8fdf0000 fffff801`8fe01000 BasicRender (deferred) fffff801`8fe10000 fffff801`8fe2c000 Npfs (deferred) fffff801`8fe30000 fffff801`8fe41000 Msfs (deferred) fffff801`8fe50000 fffff801`8fe6e000 CimFS (deferred) fffff801`8fe70000 fffff801`8fe92000 tdx (deferred) fffff801`8fea0000 fffff801`8feb0000 TDI (deferred) fffff801`8fec0000 fffff801`8fef4000 usbccgp (deferred) fffff801`8ff20000 fffff801`8ff3e000 crashdmp (deferred) fffff801`8ff40000 fffff801`8ff70000 cdrom (deferred) fffff801`8ff80000 fffff801`8ff95000 filecrypt (deferred) fffff801`8ffa0000 fffff801`8ffae000 tbs (deferred) fffff801`8ffb0000 fffff801`8ffba000 Null (deferred) fffff801`8ffc0000 fffff801`8ffca000 Beep (deferred) fffff801`91000000 fffff801`910a1000 Vid (deferred) fffff801`910b0000 fffff801`910d1000 winhvr (deferred) fffff801`910e0000 fffff801`9115b000 rdbss (deferred) fffff801`91160000 fffff801`91172000 nsiproxy (deferred) fffff801`91180000 fffff801`9118e000 npsvctrig (deferred) fffff801`91190000 fffff801`911a0000 mssmbios # (pdb symbols) C:\ProgramData\Dbg\sym\mssmbios.pdb\53ADC03D875B3F78AC94CE4D75054C461\mssmbios.pdb fffff801`911b0000 fffff801`911ba000 gpuenergydrv (deferred) fffff801`911c0000 fffff801`911ec000 dfsc (deferred) fffff801`91210000 fffff801`9127c000 fastfat (deferred) fffff801`91280000 fffff801`91297000 bam (deferred) fffff801`912a0000 fffff801`912ee000 ahcache (deferred) fffff801`912f0000 fffff801`91302000 CompositeBus (deferred) fffff801`91310000 fffff801`9131d000 kdnic (deferred) fffff801`91320000 fffff801`91335000 umbus (deferred) fffff801`91340000 fffff801`91355000 CAD (deferred) fffff801`91360000 fffff801`91409000 atikmpag (deferred) fffff801`91410000 fffff801`91837000 athw8x (deferred) fffff801`91840000 fffff801`918c5000 usbhub (deferred) fffff801`918d0000 fffff801`9193f000 HdAudio (deferred) fffff801`91940000 fffff801`9194f000 ksthunk (deferred) fffff801`91950000 fffff801`919f3000 UsbHub3 (deferred) fffff801`91a00000 fffff801`91a12000 hidusb (deferred) fffff801`91a20000 fffff801`91a7c000 netbt (deferred) fffff801`91a80000 fffff801`91a94000 afunix (deferred) fffff801`91aa0000 fffff801`91b45000 afd (deferred) fffff801`91b50000 fffff801`91b6a000 vwififlt (deferred) fffff801`91b70000 fffff801`91b9b000 pacer (deferred) fffff801`91ba0000 fffff801`91bb4000 ndiscap (deferred) fffff801`91bc0000 fffff801`91bd4000 netbios (deferred) fffff801`95e00000 fffff801`95e44000 ucx01000 (deferred) fffff801`95e50000 fffff801`95e6a000 usbehci (deferred) fffff801`95e70000 fffff801`95ee9000 USBPORT (deferred) fffff801`95ef0000 fffff801`95f15000 HDAudBus (deferred) fffff801`95f20000 fffff801`95f86000 portcls (deferred) fffff801`95f90000 fffff801`95fb1000 drmk (deferred) fffff801`95fc0000 fffff801`96036000 ks (deferred) fffff801`96040000 fffff801`960ed000 rt640x64 (deferred) fffff801`960f0000 fffff801`960fe000 vwifibus (deferred) fffff801`96100000 fffff801`96121000 i8042prt (deferred) fffff801`96130000 fffff801`96143000 mouclass (deferred) fffff801`96150000 fffff801`96164000 kbdclass (deferred) fffff801`96170000 fffff801`9617f000 CmBatt (deferred) fffff801`96180000 fffff801`96190000 BATTC (deferred) fffff801`961a0000 fffff801`961ac000 wmiacpi (deferred) fffff801`961b0000 fffff801`961f1000 intelppm (deferred) fffff801`96200000 fffff801`9620d000 NdisVirtualBus (deferred) fffff801`96210000 fffff801`9621c000 swenum (deferred) fffff801`96220000 fffff801`9622c000 iwdbus (deferred) fffff801`96230000 fffff801`9623e000 rdpbus (deferred) fffff801`96240000 fffff801`9624e000 USBD (deferred) fffff801`96250000 fffff801`9775f000 atikmdag T (no symbols) fffff801`97760000 fffff801`977fe000 USBXHCI (deferred) fffff801`a1600000 fffff801`a1627000 bindflt (deferred) fffff801`a1630000 fffff801`a1640000 MSKSSRV (deferred) fffff801`a1650000 fffff801`a168d000 rfcomm (deferred) fffff801`a1690000 fffff801`a16b2000 BthEnum (deferred) fffff801`a16c0000 fffff801`a16e6000 bthpan (deferred) fffff801`a16f0000 fffff801`a1708000 lltdio (deferred) fffff801`a1710000 fffff801`a1728000 mslldp (deferred) fffff801`a1730000 fffff801`a174b000 rspndr (deferred) fffff801`a1750000 fffff801`a180f000 nwifi (deferred) fffff801`a1810000 fffff801`a1828000 ndisuio (deferred) fffff801`a1830000 fffff801`a1886000 msquic (deferred) fffff801`a1930000 fffff801`a19b1000 cldflt (deferred) fffff801`a19c0000 fffff801`a19da000 storqosflt (deferred) fffff801`a8800000 fffff801`a8852000 mrxsmb10 (deferred) fffff801`a8860000 fffff801`a8927000 srv2 (deferred) fffff801`a8930000 fffff801`a8957000 Ndu (deferred) fffff801`a8960000 fffff801`a8a37000 peauth (deferred) fffff801`a8a40000 fffff801`a8a55000 tcpipreg (deferred) fffff801`a8a60000 fffff801`a8a72000 WdNisDrv (deferred) fffff801`a94a0000 fffff801`a9627000 HTTP (deferred) fffff801`a9630000 fffff801`a964a000 mpsdrv (deferred) fffff801`a9650000 fffff801`a9675000 bowser (deferred) fffff801`a9680000 fffff801`a9715000 mrxsmb (deferred) fffff801`a9720000 fffff801`a9766000 mrxsmb20 (deferred) fffff801`a9770000 fffff801`a9783000 vwifimp (deferred) fffff801`a9790000 fffff801`a97e6000 srvnet (deferred) fffff98e`db200000 fffff98e`db4d3000 win32kbase (deferred) fffff98e`db4e0000 fffff98e`db895000 win32kfull (deferred) fffff98e`db8a0000 fffff98e`db8e9000 cdd (deferred) fffff98e`dbee0000 fffff98e`dbf7a000 win32k T (no symbols) Unloaded modules: fffff801`7ee80000 fffff801`7ee8c000 WdmCompanion fffff801`911f0000 fffff801`9120c000 dam.sys fffff801`84600000 fffff801`84611000 WdBoot.sys fffff801`85690000 fffff801`856a1000 hwpolicy.sys
Ekran kartı hakkı rahmetine kavuşmuş yüksek ihtimal.
Atikmdag hatasından ve ekran kartı ile ilgili Windows sürücülerinin hata vermesi anlaşılıyor.
Windows Resource Protection found corrupt files and successfully repaired them.fazla söze gerek yok. Ekran kartınız bozuk.
ama yok ben emin olmak istiyorum derseniz şunları yapın:
DDU ile sürücüleri kaldırıp yeniden yükleyin.
Rehber: DDU ile Sürücü Kaldırma Rehberi
Display Driver Uninstaller (DDU), zamanla bilgisayara takılan farklı monitörler, üst üste güncellenen sürücüler ve Windows güncellemeleri sonrası biriken kayıt defteri ve sürücü dosyalarını silerek temiz bir sürücü kurulumunun yolunu açan kullanışlı bir araçtır. Adım adım sürücü temizliği...www.technopat.net
ekran kartı driverlarınızı güncelleyin.
Bir de CMD üzerinsfc /scannowkomutunu uygulayın.
laptopunuz eski olduğu için internette herhangi bir BIOS sürümü mevcut değil. Yüksek ihtimalle de günceldir zaten.
Bunları yaptıktan sonra yine mavi ekran alırsanız ekran kartınızın bozuk olduğunun göstergesi olur.
toplam 5 adet minidump dosyası var:
Kod:THREAD_STUCK_IN_DEVICE_DRIVER_M (100000ea) The device driver is spinning in an infinite loop, most likely waiting for. hardware to become idle. This usually indicates problem with the hardware. itself or with the device driver programming the hardware incorrectly. If the kernel debugger is connected and running when watchdog detects a timeout condition then DbgBreakPoint() will be called instead of KeBugCheckEx() and detailed message including BugCheck arguments will be printed to the. debugger. This way we can identify an offending thread, set breakpoints in it, and hit go to return to the spinning code to debug it further. Because. KeBugCheckEx() is not called the .BugCheck directive will not return BugCheck. information in this case. The arguments are already printed out to the kernel. debugger. You can also retrieve them from a global variable via. "dd watchdog!g_WdBugCheckData l5" (use dq on NT64). On MP machines it is possible to hit a timeout when the spinning thread is. interrupted by hardware interrupt and ISR or DPC routine is running at the time. of the BugCheck (this is because the timeout's work item can be delivered and. handled on the second CPU and the same time). If this is the case you will have. to look deeper at the offending thread's stack (e.g. using dds) to determine. spinning code which caused the timeout to occur. Arguments: Arg1: ffff8a88dcac9080, Pointer to a stuck thread object. Do .thread then kb on it to find. the hung location. Arg2: 0000000000000000, Pointer to a DEFERRED_WATCHDOG object. Arg3: 0000000000000000, Pointer to offending driver name. Arg4: 0000000000000000, Number of times "intercepted" BugCheck 0xEA was hit (see notes). Debugging Details: ------------------ *** WARNING: Unable to verify timestamp for atikmdag.sys KEY_VALUES_STRING: 1 Key : Analysis.CPU.mSec Value: 9233. Key : Analysis.DebugAnalysisManager Value: Create. Key : Analysis.Elapsed.mSec Value: 63153. Key : Analysis.IO.Other.Mb Value: 0 Key : Analysis.IO.Read.Mb Value: 0 Key : Analysis.IO.Write.Mb Value: 0 Key : Analysis.Init.CPU.mSec Value: 1124. Key : Analysis.Init.Elapsed.mSec Value: 5316. Key : Analysis.Memory.CommitPeak.Mb Value: 92. Key : Bugcheck.Code.DumpHeader Value: 0x100000ea. Key : Bugcheck.Code.Register Value: 0xea. Key : WER.OS.Branch Value: vb_release. Key : WER.OS.Timestamp Value: 2019-12-06T14:06:00Z Key : WER.OS.Version Value: 10.0.19041.1 FILE_IN_CAB: 042023-20687-01.dmp BUGCHECK_CODE: ea. BUGCHECK_P1: ffff8a88dcac9080. BUGCHECK_P2: 0 BUGCHECK_P3: 0 BUGCHECK_P4: 0 FAULTING_THREAD: ffff8a88dcac9080. BLACKBOXBSD: 1 (!blackboxbsd) BLACKBOXNTFS: 1 (!blackboxntfs) CUSTOMER_CRASH_COUNT: 1 PROCESS_NAME: System. STACK_TEXT: ffffb30b`2a214038 fffff807`1f1f451d : 00000000`000000ea ffff8a88`dcac9080 00000000`00000000 00000000`00000000 : nt!KeBugCheckEx ffffb30b`2a214040 fffff807`1f1f45fe : ffffb30b`2a214118 fffff807`23a41c38 ffffb30b`2a214118 ffff8a88`e17a3000 : dxgkrnl!TdrTimedOperationBugcheckOnTimeout+0x45 ffffb30b`2a2140b0 fffff807`23a52043 : ffff8a88`e17a3000 00000000`00000000 ffff8a88`e17a3000 fffff807`23a41c10 : dxgkrnl!TdrTimedOperationDelay+0xce ffffb30b`2a2140f0 ffff8a88`e17a3000 : 00000000`00000000 ffff8a88`e17a3000 fffff807`23a41c10 00000000`01c9c380 : atikmdag+0x42043 ffffb30b`2a2140f8 00000000`00000000 : ffff8a88`e17a3000 fffff807`23a41c10 00000000`01c9c380 fffff807`23870028 : 0xffff8a88`e17a3000 SYMBOL_NAME: dxgkrnl!TdrTimedOperationBugcheckOnTimeout+45 MODULE_NAME: dxgkrnl. IMAGE_NAME: dxgkrnl.sys IMAGE_VERSION: 10.0.19041.1865 STACK_COMMAND: .process /r /p 0xffff8a88dca93040; .thread 0xffff8a88dcac9080 ; kb. FAILURE_BUCKET_ID: 0xEA_IMAGE_dxgkrnl.sys OS_VERSION: 10.0.19041.1 BUILDLAB_STR: vb_release. OSPLATFORM_TYPE: x64. OSNAME: Windows 10. FAILURE_ID_HASH: {ea458ad2-d5ab-aa6c-7a11-54653c70dfb8} Followup: MachineOwner. ---------
Bozuk
Kod:THREAD_STUCK_IN_DEVICE_DRIVER_M (100000ea) The device driver is spinning in an infinite loop, most likely waiting for. hardware to become idle. This usually indicates problem with the hardware. itself or with the device driver programming the hardware incorrectly. If the kernel debugger is connected and running when watchdog detects a timeout condition then DbgBreakPoint() will be called instead of KeBugCheckEx() and detailed message including BugCheck arguments will be printed to the. debugger. This way we can identify an offending thread, set breakpoints in it, and hit go to return to the spinning code to debug it further. Because. KeBugCheckEx() is not called the .BugCheck directive will not return BugCheck. information in this case. The arguments are already printed out to the kernel. debugger. You can also retrieve them from a global variable via. "dd watchdog!g_WdBugCheckData l5" (use dq on NT64). On MP machines it is possible to hit a timeout when the spinning thread is. interrupted by hardware interrupt and ISR or DPC routine is running at the time. of the BugCheck (this is because the timeout's work item can be delivered and. handled on the second CPU and the same time). If this is the case you will have. to look deeper at the offending thread's stack (e.g. using dds) to determine. spinning code which caused the timeout to occur. Arguments: Arg1: ffff8a88dcac9080, Pointer to a stuck thread object. Do .thread then kb on it to find. the hung location. Arg2: 0000000000000000, Pointer to a DEFERRED_WATCHDOG object. Arg3: 0000000000000000, Pointer to offending driver name. Arg4: 0000000000000000, Number of times "intercepted" BugCheck 0xEA was hit (see notes). Debugging Details: ------------------ *** WARNING: Unable to verify timestamp for atikmdag.sys KEY_VALUES_STRING: 1 Key : Analysis.CPU.mSec Value: 9233. Key : Analysis.DebugAnalysisManager Value: Create. Key : Analysis.Elapsed.mSec Value: 63153. Key : Analysis.IO.Other.Mb Value: 0 Key : Analysis.IO.Read.Mb Value: 0 Key : Analysis.IO.Write.Mb Value: 0 Key : Analysis.Init.CPU.mSec Value: 1124. Key : Analysis.Init.Elapsed.mSec Value: 5316. Key : Analysis.Memory.CommitPeak.Mb Value: 92. Key : Bugcheck.Code.DumpHeader Value: 0x100000ea. Key : Bugcheck.Code.Register Value: 0xea. Key : WER.OS.Branch Value: vb_release. Key : WER.OS.Timestamp Value: 2019-12-06T14:06:00Z Key : WER.OS.Version Value: 10.0.19041.1 FILE_IN_CAB: 042023-20687-01.dmp BUGCHECK_CODE: ea. BUGCHECK_P1: ffff8a88dcac9080. BUGCHECK_P2: 0 BUGCHECK_P3: 0 BUGCHECK_P4: 0 FAULTING_THREAD: ffff8a88dcac9080. BLACKBOXBSD: 1 (!blackboxbsd) BLACKBOXNTFS: 1 (!blackboxntfs) CUSTOMER_CRASH_COUNT: 1 PROCESS_NAME: System. STACK_TEXT: ffffb30b`2a214038 fffff807`1f1f451d : 00000000`000000ea ffff8a88`dcac9080 00000000`00000000 00000000`00000000 : nt!KeBugCheckEx ffffb30b`2a214040 fffff807`1f1f45fe : ffffb30b`2a214118 fffff807`23a41c38 ffffb30b`2a214118 ffff8a88`e17a3000 : dxgkrnl!TdrTimedOperationBugcheckOnTimeout+0x45 ffffb30b`2a2140b0 fffff807`23a52043 : ffff8a88`e17a3000 00000000`00000000 ffff8a88`e17a3000 fffff807`23a41c10 : dxgkrnl!TdrTimedOperationDelay+0xce ffffb30b`2a2140f0 ffff8a88`e17a3000 : 00000000`00000000 ffff8a88`e17a3000 fffff807`23a41c10 00000000`01c9c380 : atikmdag+0x42043 ffffb30b`2a2140f8 00000000`00000000 : ffff8a88`e17a3000 fffff807`23a41c10 00000000`01c9c380 fffff807`23870028 : 0xffff8a88`e17a3000 SYMBOL_NAME: dxgkrnl!TdrTimedOperationBugcheckOnTimeout+45 MODULE_NAME: dxgkrnl. IMAGE_NAME: dxgkrnl.sys IMAGE_VERSION: 10.0.19041.1865 STACK_COMMAND: .process /r /p 0xffff8a88dca93040; .thread 0xffff8a88dcac9080 ; kb. FAILURE_BUCKET_ID: 0xEA_IMAGE_dxgkrnl.sys OS_VERSION: 10.0.19041.1 BUILDLAB_STR: vb_release. OSPLATFORM_TYPE: x64. OSNAME: Windows 10. FAILURE_ID_HASH: {ea458ad2-d5ab-aa6c-7a11-54653c70dfb8} Followup: MachineOwner. ---------
Bozuk
Kod:THREAD_STUCK_IN_DEVICE_DRIVER_M (100000ea) The device driver is spinning in an infinite loop, most likely waiting for. hardware to become idle. This usually indicates problem with the hardware. itself or with the device driver programming the hardware incorrectly. If the kernel debugger is connected and running when watchdog detects a timeout condition then DbgBreakPoint() will be called instead of KeBugCheckEx() and detailed message including BugCheck arguments will be printed to the. debugger. This way we can identify an offending thread, set breakpoints in it, and hit go to return to the spinning code to debug it further. Because. KeBugCheckEx() is not called the .BugCheck directive will not return BugCheck. information in this case. The arguments are already printed out to the kernel. debugger. You can also retrieve them from a global variable via. "dd watchdog!g_WdBugCheckData l5" (use dq on NT64). On MP machines it is possible to hit a timeout when the spinning thread is. interrupted by hardware interrupt and ISR or DPC routine is running at the time. of the BugCheck (this is because the timeout's work item can be delivered and. handled on the second CPU and the same time). If this is the case you will have. to look deeper at the offending thread's stack (e.g. using dds) to determine. spinning code which caused the timeout to occur. Arguments: Arg1: ffffc50eff5be040, Pointer to a stuck thread object. Do .thread then kb on it to find. the hung location. Arg2: 0000000000000000, Pointer to a DEFERRED_WATCHDOG object. Arg3: 0000000000000000, Pointer to offending driver name. Arg4: 0000000000000000, Number of times "intercepted" BugCheck 0xEA was hit (see notes). Debugging Details: ------------------ *** WARNING: Unable to verify timestamp for atikmdag.sys *** WARNING: Unable to verify timestamp for win32k.sys KEY_VALUES_STRING: 1 Key : Analysis.CPU.mSec Value: 7156. Key : Analysis.DebugAnalysisManager Value: Create. Key : Analysis.Elapsed.mSec Value: 100509. Key : Analysis.IO.Other.Mb Value: 0 Key : Analysis.IO.Read.Mb Value: 0 Key : Analysis.IO.Write.Mb Value: 0 Key : Analysis.Init.CPU.mSec Value: 811. Key : Analysis.Init.Elapsed.mSec Value: 3013. Key : Analysis.Memory.CommitPeak.Mb Value: 97. Key : Bugcheck.Code.DumpHeader Value: 0x100000ea. Key : Bugcheck.Code.Register Value: 0xea. Key : WER.OS.Branch Value: vb_release. Key : WER.OS.Timestamp Value: 2019-12-06T14:06:00Z Key : WER.OS.Version Value: 10.0.19041.1 FILE_IN_CAB: 042023-19343-01.dmp BUGCHECK_CODE: ea. BUGCHECK_P1: ffffc50eff5be040. BUGCHECK_P2: 0 BUGCHECK_P3: 0 BUGCHECK_P4: 0 FAULTING_THREAD: ffffc50eff5be040. CUSTOMER_CRASH_COUNT: 1 PROCESS_NAME: System. STACK_TEXT: ffffc081`557ee038 fffff801`8fa4451d : 00000000`000000ea ffffc50e`ff5be040 00000000`00000000 00000000`00000000 : nt!KeBugCheckEx ffffc081`557ee040 fffff801`8fa445fe : ffffc081`557ee118 fffff801`96281e88 ffffc081`557ee118 ffffc50e`fd215000 : dxgkrnl!TdrTimedOperationBugcheckOnTimeout+0x45 ffffc081`557ee0b0 fffff801`96292393 : ffffc50e`fd215000 00000000`00000000 ffffc50e`fd215000 fffff801`96281e60 : dxgkrnl!TdrTimedOperationDelay+0xce ffffc081`557ee0f0 ffffc50e`fd215000 : 00000000`00000000 ffffc50e`fd215000 fffff801`96281e60 00000000`01c9c380 : atikmdag+0x42393 ffffc081`557ee0f8 00000000`00000000 : ffffc50e`fd215000 fffff801`96281e60 00000000`01c9c380 00000000`00000028 : 0xffffc50e`fd215000 SYMBOL_NAME: dxgkrnl!TdrTimedOperationBugcheckOnTimeout+45 MODULE_NAME: dxgkrnl. IMAGE_NAME: dxgkrnl.sys IMAGE_VERSION: 10.0.19041.1865 STACK_COMMAND: .process /r /p 0xffffc50ef848f040; .thread 0xffffc50eff5be040 ; kb. FAILURE_BUCKET_ID: 0xEA_IMAGE_dxgkrnl.sys OS_VERSION: 10.0.19041.1 BUILDLAB_STR: vb_release. OSPLATFORM_TYPE: x64. OSNAME: Windows 10. FAILURE_ID_HASH: {ea458ad2-d5ab-aa6c-7a11-54653c70dfb8} Followup: MachineOwner. ---------
Eğer yardımcı olabildiysem çözüm olarak işaretlerseniz memnun olurum.
bana böyle bir yazı yazdı ne anlama gelmekte ?IRQL komutu ile verdiği hatadan da belli oluyor ama yeni yeni öğreniyorum%100 emin olmadığım şey için de yanlış bilgilendirmek istemedim.
Windows Resource Protection found corrupt files and successfully repaired them.
For Online repairs, details are included in the CBS log file located at
windir\Logs\CBS\CBS.log. For example C:\Windows\Logs\CBS\CBS.log. For offline
Repairs, details are included in the log file provided by the /OFFLOGFILE flag.
Bana böyle bir yazı yazdı ne anlama gelmekte?
ddu yu hangi steden indirebilirim nasıl indirebilirim ?Sistem dosyaları ile alakalı bazı sorunlar yapılandırılmış. Birkaç Windows dosyası düzeltilmiş.