Video izlerken mavi ekran hatası

İşletim sistemi
Windows 10
DDU ile ekran kartı sürücüsünü kaldırıp yeniden kurun.

Vanguard, BattlEye ve MSI Afterburner'i kaldırın.

Aşağıdaki rehberi uygulayın sonucu paylaşın.

Ekran kartı/kartlarına OCCT ile stres ve VRAM testi yapın.

Cihazın tam modelini belirtin. Sorun devam ederse dosyaları paylaşmayı unutmayın.


Kod:
Microsoft (R) Windows Debugger Version 10.0.20153.1000 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.


Loading Dump File [C:\Users\maksu\Desktop\120820-11906-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available


************* Path validation summary **************
Response                         Time (ms)     Location
Deferred                                       srv*
Symbol search path is: srv*
Executable search path is:
Windows 10 Kernel Version 19041 MP (8 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS
Edition build lab: 19041.1.amd64fre.vb_release.191206-1406
Machine Name:
Kernel base = 0xfffff803`41c00000 PsLoadedModuleList = 0xfffff803`4282a3b0
Debug session time: Tue Dec  8 12:11:48.927 2020 (UTC + 3:00)
System Uptime: 1 days 19:18:51.809
Loading Kernel Symbols
...............................................................
................................................................
................................................................
................
Loading User Symbols
Loading unloaded module list
..................................................
For analysis of this file, run !analyze -v
nt!KeBugCheckEx:
fffff803`41ff5210 48894c2408      mov     qword ptr [rsp+8],rcx ss:0018:fffff184`afee1170=000000000000010e
0: kd> !analyze -v
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

VIDEO_MEMORY_MANAGEMENT_INTERNAL (10e)
The video memory manager encountered a condition that it can't recover from. By crashing,
the video memory manager is attempting to get enough information into the minidump such that
somebody can pinpoint what lead to this condition.
Arguments:
Arg1: 000000000000001d, The subtype of the bugcheck:
Arg2: ffffa8078e5bed70
Arg3: 0000000000000000
Arg4: 0000000000000000

Debugging Details:
------------------

*** WARNING: Unable to verify checksum for win32k.sys

KEY_VALUES_STRING: 1

    Key  : Analysis.CPU.mSec
    Value: 11187

    Key  : Analysis.DebugAnalysisProvider.CPP
    Value: Create: 8007007e on DESKTOP-G2EFLS9

    Key  : Analysis.DebugData
    Value: CreateObject

    Key  : Analysis.DebugModel
    Value: CreateObject

    Key  : Analysis.Elapsed.mSec
    Value: 75368

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 86

    Key  : Analysis.System
    Value: CreateObject

    Key  : WER.OS.Branch
    Value: vb_release

    Key  : WER.OS.Timestamp
    Value: 2019-12-06T14:06:00Z

    Key  : WER.OS.Version
    Value: 10.0.19041.1


ADDITIONAL_XML: 1

OS_BUILD_LAYERS: 1

BUGCHECK_CODE:  10e

BUGCHECK_P1: 1d

BUGCHECK_P2: ffffa8078e5bed70

BUGCHECK_P3: 0

BUGCHECK_P4: 0

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXPNP: 1 (!blackboxpnp)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  System

STACK_TEXT: 
fffff184`afee1168 fffff803`5b653ad0     : 00000000`0000010e 00000000`0000001d ffffa807`8e5bed70 00000000`00000000 : nt!KeBugCheckEx
fffff184`afee1170 fffff803`5d6dd250     : 00000000`00000000 ffffa807`8e5bed70 ffffa807`8f5c8490 00000000`00000000 : watchdog!WdLogEvent5_WdCriticalError+0xe0
fffff184`afee11b0 fffff803`5d6c295b     : 00000000`00000000 00000000`00000000 00000000`00000000 00010100`00000000 : dxgmms2!VIDMM_GLOBAL::UpdatePageTable+0x2ced0
fffff184`afee1440 fffff803`5d6b0e27     : 00000000`00000002 00000000`00006000 00000000`00000000 00000000`00000000 : dxgmms2!VIDMM_PAGE_TABLE::UpdatePageTableInvalidate+0xf3
fffff184`afee1510 fffff803`5d6af6cd     : 00000000`00000002 00000000`00006000 00000000`00000000 00000000`00000000 : dxgmms2!VIDMM_PAGE_TABLE::CommitVirtualAddressRange+0x2bf
fffff184`afee15b0 fffff803`5d6dc5fa     : 00000000`00000002 ffffb80f`95f76f40 ffffb80f`9ba64301 00000000`00000000 : dxgmms2!VIDMM_PAGE_DIRECTORY::CommitVirtualAddressRange+0x77d
fffff184`afee1720 fffff803`5d6ae98a     : 00000000`00000005 ffffb80f`95f76f40 00000000`00001000 00000000`00000000 : dxgmms2!VIDMM_PAGE_DIRECTORY::CommitVirtualAddressRange+0x2d6aa
fffff184`afee1890 fffff803`5d6ad874     : ffffa807`8f5be710 ffffb80f`00000002 00000000`00000000 00000000`00000000 : dxgmms2!CVirtualAddressAllocator::CommitVirtualAddressRange+0x2f6
fffff184`afee1a10 fffff803`5d6c262b     : 00000000`00000103 00000000`00000000 00000000`00000000 00000000`00000000 : dxgmms2!VIDMM_GLOBAL::PageInOneAllocation+0x3b4
fffff184`afee1b30 fffff803`5d6b0da3     : 00000000`00000002 fffff803`425b1019 00000000`00000000 00000000`00000000 : dxgmms2!VIDMM_PAGE_TABLE::CommitPageTable+0x6f
fffff184`afee1b80 fffff803`5d6af6cd     : 00000000`00000002 00000000`00005000 00000000`00000000 00000000`00000000 : dxgmms2!VIDMM_PAGE_TABLE::CommitVirtualAddressRange+0x23b
fffff184`afee1c20 fffff803`5d6dc5fa     : 00000000`00000002 ffffb80f`95f76f40 ffffb80f`9b3a1501 00000000`00000000 : dxgmms2!VIDMM_PAGE_DIRECTORY::CommitVirtualAddressRange+0x77d
fffff184`afee1d90 fffff803`5d6ae98a     : 00000000`00000005 ffffb80f`95f76f40 00000000`00001000 00000000`00000000 : dxgmms2!VIDMM_PAGE_DIRECTORY::CommitVirtualAddressRange+0x2d6aa
fffff184`afee1f00 fffff803`5d6ad874     : ffffa807`8f5c1010 ffffb80f`00000002 00000000`00000000 00000000`00000000 : dxgmms2!CVirtualAddressAllocator::CommitVirtualAddressRange+0x2f6
fffff184`afee2080 fffff803`5d6c262b     : fffff184`afee2818 00000000`00004000 00000000`00000120 00000000`00000000 : dxgmms2!VIDMM_GLOBAL::PageInOneAllocation+0x3b4
fffff184`afee21a0 fffff803`5d6b0da3     : 00000000`00000002 ffff3d58`f15c0893 00000000`404a2000 fffff184`afee2640 : dxgmms2!VIDMM_PAGE_TABLE::CommitPageTable+0x6f
fffff184`afee21f0 fffff803`5d6af6cd     : 00000000`00000002 00000000`00000000 00000000`00000000 00000000`00000000 : dxgmms2!VIDMM_PAGE_TABLE::CommitVirtualAddressRange+0x23b
fffff184`afee2290 fffff803`5d6dc5fa     : 00000000`00000002 ffffb80f`95f76f40 fffff803`00000001 00000000`00000000 : dxgmms2!VIDMM_PAGE_DIRECTORY::CommitVirtualAddressRange+0x77d
fffff184`afee2400 fffff803`5d6ae98a     : 00000000`00000007 ffffb80f`95f76f40 00000000`00000000 00000000`00000000 : dxgmms2!VIDMM_PAGE_DIRECTORY::CommitVirtualAddressRange+0x2d6aa
fffff184`afee2570 fffff803`5d6b1498     : 00000000`ffffffff fffff184`afee2800 00000000`00000000 00000000`00001001 : dxgmms2!CVirtualAddressAllocator::CommitVirtualAddressRange+0x2f6
fffff184`afee26f0 fffff803`5d6df06d     : 00000000`00000000 00000000`00000071 fffff184`afee2880 ffffb80f`95f78410 : dxgmms2!VIDMM_GLOBAL::CommitVirtualAddressRangeSystemCommand+0x188
fffff184`afee2780 fffff803`5d6ca5d2     : ffffb80f`95f783e0 fffff184`00000001 00000000`00000001 ffffb80f`95d3f420 : dxgmms2!VIDMM_GLOBAL::ProcessSystemCommand+0x2c379
fffff184`afee2900 fffff803`5d6d3e99     : ffffb80f`95d3f3b0 ffffa807`8fb14001 fffff184`affd9700 00000000`078c6c00 : dxgmms2!VIDMM_WORKER_THREAD::Run+0x1462
fffff184`afee2ae0 fffff803`41ea29a5     : ffffa807`8fb140c0 fffff803`5d6d3e90 ffffb80f`95d3f3b0 000fa4ef`bd9bbfff : dxgmms2!VidMmWorkerThreadProc+0x9
fffff184`afee2b10 fffff803`41ffc868     : ffffde01`05342180 ffffa807`8fb140c0 fffff803`41ea2950 58e7b96d`0d7871f7 : nt!PspSystemThreadStartup+0x55
fffff184`afee2b60 00000000`00000000     : fffff184`afee3000 fffff184`afedc000 00000000`00000000 00000000`00000000 : nt!KiStartSystemThread+0x28


SYMBOL_NAME:  dxgmms2!VIDMM_GLOBAL::UpdatePageTable+2ced0

MODULE_NAME: dxgmms2

IMAGE_NAME:  dxgmms2.sys

IMAGE_VERSION:  10.0.19041.545

STACK_COMMAND:  .thread ; .cxr ; kb

BUCKET_ID_FUNC_OFFSET:  2ced0

FAILURE_BUCKET_ID:  0x10e_1d_dxgmms2!VIDMM_GLOBAL::UpdatePageTable

OS_VERSION:  10.0.19041.1

BUILDLAB_STR:  vb_release

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

FAILURE_ID_HASH:  {71cfaed7-afd6-912e-e10e-336c7c7acd87}

Followup:     MachineOwner
---------
 

Geri
Yukarı