VIDEO_TDR_FAILURE (116) mavi ekran hatası

NiqhtMegatron

Hectopat
Katılım
7 Haziran 2020
Mesajlar
439
Çözümler
3

Arkadaşlar yukarıda şu ana kadar oluşan bütün minidump dosyalarını paylaştım. Acaba vakit ayırıp bakabilir misiniz? Sorunu uzun zamandır çözemedim.

Sistem: Ryzen 7 3700 X, RX 5700 XT, ASUS B550 Prime, 8*2 RAM. 700W Cooler Master 80+

Sorun: Dostlar RDR 2'yi aralıksız 9 saat oynadım ara verdim açık bıraktım vs. hiç sorun olmadı. Ama bazen DC açıkken LoL açıyorum ve önce bilgisayar donuyor, birkaç saniye sonra resetleniyor. Tekrar açılıyor. Yukarıda örnek verdim çünkü sorun kartı zorlamamla alakalı değil. Bazen Far Cry Primal'a girerken oluyor, bazen YouTube açarken. Ama oyun ya da programları açtıktan sonra kapanma sorunu olmuyor. Alt+Tab yaparsam vs. bazen oluyor. Yardımcı olursanız çok sevinirim.
Kartın garantisi devam ediyor ama şu dönemde göndersem ne zaman gelir bilmiyorum. Bir yandan üniversite dersleri de başladı yani elimde uzun süre PC'siz kalabilecek vakit yok.
 
Son düzenleyen: Moderatör:
  1. Ekran kartı sürücünüzü DDU ile kaldırıp WHQL sürüm yükleyin.

  2. GPUTweak programını kaldırın ve yaptıysanız tüm OC işlemlerini geri alın. Buna sadece ekran kartı değil, RAM ve işlemci de dahil.
  3. Ekran kartınızı OCCT ile test edin sürücü işleminden sonra.
  4. Yüklü olan Android emulatörleri kaldırın.
  5. Riot Vanguard'ı kaldırın.

Atmış olduğunuz 5 dosyanın 2 tanesi oluşmamış, arızalı. Diğer dosyalarda ise gördüklerim bunlar.

Kod:
Microsoft (R) Windows Debugger Version 10.0.20153.1000 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.


Loading Dump File [C:\Users\CsHay\AppData\Local\Temp\Rar$DIa1672.21833\102520-11281-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available


************* Path validation summary **************
Response                         Time (ms)     Location
Deferred                                       srv*
Symbol search path is: srv*
Executable search path is:
Windows 10 Kernel Version 19041 MP (16 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS
Edition build lab: 19041.1.amd64fre.vb_release.191206-1406
Machine Name:
Kernel base = 0xfffff801`2b200000 PsLoadedModuleList = 0xfffff801`2be2a310
Debug session time: Sun Oct 25 13:30:47.458 2020 (UTC + 3:00)
System Uptime: 1 days 13:59:16.111
Loading Kernel Symbols
...............................................................
................................................................
................................................................
..............
Loading User Symbols
Loading unloaded module list
...........
For analysis of this file, run !analyze -v
nt!KeBugCheckEx:
fffff801`2b5f45a0 48894c2408      mov     qword ptr [rsp+8],rcx ss:0018:ffffdb06`ef3158b0=000000000000003b
2: kd> !analyze -v
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

SYSTEM_SERVICE_EXCEPTION (3b)
An exception happened while executing a system service routine.
Arguments:
Arg1: 00000000c0000005, Exception code that caused the bugcheck
Arg2: fffff8012b4c971b, Address of the instruction which caused the bugcheck
Arg3: ffffdb06ef3161b0, Address of the context record for the exception that caused the bugcheck
Arg4: 0000000000000000, zero.

Debugging Details:
------------------


KEY_VALUES_STRING: 1

    Key  : Analysis.CPU.mSec
    Value: 5718

    Key  : Analysis.DebugAnalysisProvider.CPP
    Value: Create: 8007007e on DESKTOP-IPC9T25

    Key  : Analysis.DebugData
    Value: CreateObject

    Key  : Analysis.DebugModel
    Value: CreateObject

    Key  : Analysis.Elapsed.mSec
    Value: 18360

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 85

    Key  : Analysis.System
    Value: CreateObject

    Key  : WER.OS.Branch
    Value: vb_release

    Key  : WER.OS.Timestamp
    Value: 2019-12-06T14:06:00Z

    Key  : WER.OS.Version
    Value: 10.0.19041.1


ADDITIONAL_XML: 1

OS_BUILD_LAYERS: 1

BUGCHECK_CODE:  3b

BUGCHECK_P1: c0000005

BUGCHECK_P2: fffff8012b4c971b

BUGCHECK_P3: ffffdb06ef3161b0

BUGCHECK_P4: 0

CONTEXT:  ffffdb06ef3161b0 -- (.cxr 0xffffdb06ef3161b0)
rax=6c9940aa68e4006a rbx=ffffb488a4600290 rcx=ffffb488a9370d38
rdx=ffffb488a4e5dd88 rsi=0000000000000000 rdi=6c9940aa68e4006a
rip=fffff8012b4c971b rsp=ffffdb06ef316bb8 rbp=ffffdb06ef316c48
 r8=ffffb488ad315ba8  r9=ffffb488ad315ba8 r10=0000000000000000
r11=ffffb488c10918c8 r12=0000000000000000 r13=ffffb488a4e53000
r14=0000000000000000 r15=0000000000000026
iopl=0         nv up ei pl zr na po nc
cs=0010  ss=0018  ds=002b  es=002b  fs=0053  gs=002b             efl=00050246
nt!RtlRbRemoveNode+0x39b:
fffff801`2b4c971b 488b07          mov     rax,qword ptr [rdi] ds:002b:6c9940aa`68e4006a=????????????????
Resetting default scope

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXPNP: 1 (!blackboxpnp)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  lsass.exe

STACK_TEXT: 
ffffdb06`ef316bb8 fffff801`2b4c7ce5     : ffffdb06`ef316c48 00000000`00000022 ffffb488`a4e5dd80 00000000`00000026 : nt!RtlRbRemoveNode+0x39b
ffffdb06`ef316bd0 fffff801`2b4c7aca     : ffff2765`00000002 ffffc78d`c88e91a0 ffffc78d`d3937b20 00000000`00000250 : nt!RtlpHpVsChunkSplit+0x45
ffffdb06`ef316c90 fffff801`2b4cb048     : 00000000`00000000 ffffdb06`00000210 ffffdb06`ef316dd1 00000000`00000210 : nt!RtlpHpVsContextAllocateInternal+0x1fa
ffffdb06`ef316cf0 fffff801`2b4ca78f     : ffffdb06`00000000 00000000`00000005 00000000`74536d4d fffff801`2b80ba0a : nt!ExAllocateHeapPool+0x888
ffffdb06`ef316e30 fffff801`2b54ff76     : 00000000`80000000 00000000`00000200 00000000`74536d4d ffffc78d`00000000 : nt!ExpAllocatePoolWithTagFromNode+0x5f
ffffdb06`ef316e80 fffff801`2b513107     : 00000000`00000000 ffffdb06`ef316f40 00000000`00000040 ffffdb06`08000000 : nt!MiAllocatePool+0x86
ffffdb06`ef316ed0 fffff801`2b550fc2     : ffffffff`ffffffff ffffffff`ffffffff ffffc78d`d563cad0 fffff801`00000000 : nt!MiCreatePrototypePtes+0x53
ffffdb06`ef316f80 fffff801`2b507f34     : 00000000`00000001 00000000`00000040 00000000`00000000 fffff801`00000040 : nt!MiAddViewsForSection+0x3c2
ffffdb06`ef317080 fffff801`2b5093fe     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!MmMapViewInSystemCache+0xc4
ffffdb06`ef317200 fffff801`2b53767a     : 00000000`00000000 fffff801`00000000 ffffc78d`00000000 ffffdb06`00000000 : nt!CcGetVacbMiss+0xce
ffffdb06`ef317290 fffff801`2b900890     : ffffc78d`00000000 00000000`00000000 ffffdb06`ef3173d0 ffffdb06`ef3173e0 : nt!CcGetVirtualAddress+0x33a
ffffdb06`ef317330 fffff801`2b536c89     : 00000000`00000000 00000000`00000000 00000000`00000000 fffff801`2b48dd01 : nt!CcMapAndCopyFromCache+0x80
ffffdb06`ef3173d0 fffff801`2e3c36bf     : ffffb488`00000000 ffffb488`00000000 ffffb488`0000000c ffffb488`00000000 : nt!CcCopyReadEx+0x139
ffffdb06`ef317480 fffff801`2e3c511f     : ffffb488`ae4c18f0 ffffdb06`ef317720 00000000`00000003 ffffb488`ae4c1700 : Ntfs!NtfsCachedRead+0x177
ffffdb06`ef3174f0 fffff801`2e3c40cc     : ffffc78d`d44c0cc8 ffffc78d`d5357010 ffffc78d`00000001 ffffc78d`0000000c : Ntfs!NtfsCommonRead+0xe1f
ffffdb06`ef3176f0 fffff801`2b4cd805     : ffffc78d`d519d010 ffffc78d`d5357010 ffffc78d`d5357010 ffffc78d`c876ed60 : Ntfs!NtfsFsdRead+0x1fc
ffffdb06`ef3177c0 fffff801`28376ccf     : ffffc78d`d528b010 00000000`00000000 00000000`00000000 ffffc78d`d528b010 : nt!IofCallDriver+0x55
ffffdb06`ef317800 fffff801`283748d3     : ffffdb06`ef317890 00000000`00000000 ffffdb06`ef3178b8 fffff801`2b8efe11 : FLTMGR!FltpLegacyProcessingAfterPreCallbacksCompleted+0x28f
ffffdb06`ef317870 fffff801`2b4cd805     : ffffc78d`d5357010 00000000`00000000 ffffdb06`ef317b80 00000000`00000000 : FLTMGR!FltpDispatch+0xa3
ffffdb06`ef3178d0 fffff801`2b8c2528     : 00000000`00000000 ffffc78d`d6e0b4c0 00000000`00000001 ffffc78d`c2aff201 : nt!IofCallDriver+0x55
ffffdb06`ef317910 fffff801`2b8b99d9     : ffffc78d`00000000 ffffdb06`ef317b80 00000000`00000000 ffffdb06`ef317b80 : nt!IopSynchronousServiceTail+0x1a8
ffffdb06`ef3179b0 fffff801`2b605fb8     : 00000000`00001af8 00000000`00000000 00000000`00000000 00000000`00000000 : nt!NtReadFile+0x599
ffffdb06`ef317a90 00007fff`6b5ebe54     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x28
0000008b`ec4fe318 00000000`00000000     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007fff`6b5ebe54


SYMBOL_NAME:  nt!RtlRbRemoveNode+39b

MODULE_NAME: nt

IMAGE_NAME:  ntkrnlmp.exe

IMAGE_VERSION:  10.0.19041.572

STACK_COMMAND:  .cxr 0xffffdb06ef3161b0 ; kb

BUCKET_ID_FUNC_OFFSET:  39b

FAILURE_BUCKET_ID:  0x3B_c0000005_nt!RtlRbRemoveNode

OS_VERSION:  10.0.19041.1

BUILDLAB_STR:  vb_release

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

FAILURE_ID_HASH:  {dcc50c37-502a-06f7-586d-2cded5d3c812}

Followup:     MachineOwner
---------

Microsoft (R) Windows Debugger Version 10.0.20153.1000 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.


Loading Dump File [C:\Users\CsHay\AppData\Local\Temp\Rar$DIa1672.21194\102720-6437-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available


************* Path validation summary **************
Response                         Time (ms)     Location
Deferred                                       srv*
Symbol search path is: srv*
Executable search path is:
Windows 10 Kernel Version 19041 MP (16 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS
Edition build lab: 19041.1.amd64fre.vb_release.191206-1406
Machine Name:
Kernel base = 0xfffff804`1d200000 PsLoadedModuleList = 0xfffff804`1de2a310
Debug session time: Tue Oct 27 21:22:31.325 2020 (UTC + 3:00)
System Uptime: 0 days 23:06:56.643
Loading Kernel Symbols
...............................................................
................................................................
................................................................
.............
Loading User Symbols
Loading unloaded module list
.................
For analysis of this file, run !analyze -v
nt!KeBugCheckEx:
fffff804`1d5f45a0 48894c2408      mov     qword ptr [rsp+8],rcx ss:0018:ffffb784`850d8a00=0000000000000116
1: kd> !analyze -v
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

VIDEO_TDR_FAILURE (116)
Attempt to reset the display driver and recover from timeout failed.
Arguments:
Arg1: ffffba092ce7a010, Optional pointer to internal TDR recovery context (TDR_RECOVERY_CONTEXT).
Arg2: fffff80431902230, The pointer into responsible device driver module (e.g. owner tag).
Arg3: ffffffffc0000001, Optional error code (NTSTATUS) of the last failed operation.
Arg4: 0000000000000003, Optional internal context dependent data.

Debugging Details:
------------------

Unable to load image \SystemRoot\System32\DriverStore\FileRepository\u0360073.inf_amd64_4d0a7206a56b4676\B360064\amdkmdag.sys, Win32 error 0n2
*** WARNING: Unable to verify timestamp for amdkmdag.sys
*** WARNING: Unable to verify timestamp for win32k.sys

KEY_VALUES_STRING: 1

    Key  : Analysis.CPU.mSec
    Value: 5796

    Key  : Analysis.DebugAnalysisProvider.CPP
    Value: Create: 8007007e on DESKTOP-IPC9T25

    Key  : Analysis.DebugData
    Value: CreateObject

    Key  : Analysis.DebugModel
    Value: CreateObject

    Key  : Analysis.Elapsed.mSec
    Value: 30995

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 86

    Key  : Analysis.System
    Value: CreateObject

    Key  : WER.OS.Branch
    Value: vb_release

    Key  : WER.OS.Timestamp
    Value: 2019-12-06T14:06:00Z

    Key  : WER.OS.Version
    Value: 10.0.19041.1


ADDITIONAL_XML: 1

OS_BUILD_LAYERS: 1

BUGCHECK_CODE:  116

BUGCHECK_P1: ffffba092ce7a010

BUGCHECK_P2: fffff80431902230

BUGCHECK_P3: ffffffffc0000001

BUGCHECK_P4: 3

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXPNP: 1 (!blackboxpnp)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  System

STACK_TEXT: 
ffffb784`850d89f8 fffff804`2ac814be     : 00000000`00000116 ffffba09`2ce7a010 fffff804`31902230 ffffffff`c0000001 : nt!KeBugCheckEx
ffffb784`850d8a00 fffff804`2ac298db     : fffff804`31902230 ffffba09`28559000 ffffba09`285590f0 00000000`00000000 : dxgkrnl!TdrBugcheckOnTimeout+0xfe
ffffb784`850d8a40 fffff804`2ac2a6ae     : ffffba09`00000101 00000000`00002000 ffffba09`28559000 00000000`01000000 : dxgkrnl!DXGADAPTER::PrepareToReset+0x1a3
ffffb784`850d8a90 fffff804`2ac80be5     : 00000000`00000100 ffffba09`28559a58 00000000`00000000 00000000`00000300 : dxgkrnl!DXGADAPTER::Reset+0x28e
ffffb784`850d8b10 fffff804`2ac80d57     : fffff804`1df25440 00000000`00000000 00000000`00000000 00000000`00000300 : dxgkrnl!TdrResetFromTimeout+0x15
ffffb784`850d8b40 fffff804`1d5035f5     : ffffba09`30d9e040 fffff804`2ac80d30 ffffba09`19284ce0 ffffba09`00000000 : dxgkrnl!TdrResetFromTimeoutWorkItem+0x27
ffffb784`850d8b70 fffff804`1d4a2ae5     : ffffba09`30d9e040 00000000`00000080 ffffba09`192a7040 ba07c3b6`b9cba591 : nt!ExpWorkerThread+0x105
ffffb784`850d8c10 fffff804`1d5fbbf8     : ffff9780`eed9c180 ffffba09`30d9e040 fffff804`1d4a2a90 ba98bc2d`ba821b8f : nt!PspSystemThreadStartup+0x55
ffffb784`850d8c60 00000000`00000000     : ffffb784`850d9000 ffffb784`850d3000 00000000`00000000 00000000`00000000 : nt!KiStartSystemThread+0x28


SYMBOL_NAME:  amdkmdag+b2230

MODULE_NAME: amdkmdag

IMAGE_NAME:  amdkmdag.sys

STACK_COMMAND:  .thread ; .cxr ; kb

FAILURE_BUCKET_ID:  0x116_IMAGE_amdkmdag.sys

OS_VERSION:  10.0.19041.1

BUILDLAB_STR:  vb_release

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

FAILURE_ID_HASH:  {1c94a7e8-453f-c7b9-1484-0a0454a0ee36}

Followup:     MachineOwner
---------

1: kd> !analyze -v
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

VIDEO_TDR_FAILURE (116)
Attempt to reset the display driver and recover from timeout failed.
Arguments:
Arg1: ffffba092ce7a010, Optional pointer to internal TDR recovery context (TDR_RECOVERY_CONTEXT).
Arg2: fffff80431902230, The pointer into responsible device driver module (e.g. owner tag).
Arg3: ffffffffc0000001, Optional error code (NTSTATUS) of the last failed operation.
Arg4: 0000000000000003, Optional internal context dependent data.

Debugging Details:
------------------


KEY_VALUES_STRING: 1

    Key  : Analysis.CPU.mSec
    Value: 3546

    Key  : Analysis.DebugAnalysisProvider.CPP
    Value: Create: 8007007e on DESKTOP-IPC9T25

    Key  : Analysis.DebugData
    Value: CreateObject

    Key  : Analysis.DebugModel
    Value: CreateObject

    Key  : Analysis.Elapsed.mSec
    Value: 10921

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 86

    Key  : Analysis.System
    Value: CreateObject

    Key  : WER.OS.Branch
    Value: vb_release

    Key  : WER.OS.Timestamp
    Value: 2019-12-06T14:06:00Z

    Key  : WER.OS.Version
    Value: 10.0.19041.1


ADDITIONAL_XML: 1

OS_BUILD_LAYERS: 1

BUGCHECK_CODE:  116

BUGCHECK_P1: ffffba092ce7a010

BUGCHECK_P2: fffff80431902230

BUGCHECK_P3: ffffffffc0000001

BUGCHECK_P4: 3

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXPNP: 1 (!blackboxpnp)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  System

STACK_TEXT: 
ffffb784`850d89f8 fffff804`2ac814be     : 00000000`00000116 ffffba09`2ce7a010 fffff804`31902230 ffffffff`c0000001 : nt!KeBugCheckEx
ffffb784`850d8a00 fffff804`2ac298db     : fffff804`31902230 ffffba09`28559000 ffffba09`285590f0 00000000`00000000 : dxgkrnl!TdrBugcheckOnTimeout+0xfe
ffffb784`850d8a40 fffff804`2ac2a6ae     : ffffba09`00000101 00000000`00002000 ffffba09`28559000 00000000`01000000 : dxgkrnl!DXGADAPTER::PrepareToReset+0x1a3
ffffb784`850d8a90 fffff804`2ac80be5     : 00000000`00000100 ffffba09`28559a58 00000000`00000000 00000000`00000300 : dxgkrnl!DXGADAPTER::Reset+0x28e
ffffb784`850d8b10 fffff804`2ac80d57     : fffff804`1df25440 00000000`00000000 00000000`00000000 00000000`00000300 : dxgkrnl!TdrResetFromTimeout+0x15
ffffb784`850d8b40 fffff804`1d5035f5     : ffffba09`30d9e040 fffff804`2ac80d30 ffffba09`19284ce0 ffffba09`00000000 : dxgkrnl!TdrResetFromTimeoutWorkItem+0x27
ffffb784`850d8b70 fffff804`1d4a2ae5     : ffffba09`30d9e040 00000000`00000080 ffffba09`192a7040 ba07c3b6`b9cba591 : nt!ExpWorkerThread+0x105
ffffb784`850d8c10 fffff804`1d5fbbf8     : ffff9780`eed9c180 ffffba09`30d9e040 fffff804`1d4a2a90 ba98bc2d`ba821b8f : nt!PspSystemThreadStartup+0x55
ffffb784`850d8c60 00000000`00000000     : ffffb784`850d9000 ffffb784`850d3000 00000000`00000000 00000000`00000000 : nt!KiStartSystemThread+0x28


SYMBOL_NAME:  amdkmdag+b2230

MODULE_NAME: amdkmdag

IMAGE_NAME:  amdkmdag.sys

STACK_COMMAND:  .thread ; .cxr ; kb

FAILURE_BUCKET_ID:  0x116_IMAGE_amdkmdag.sys

OS_VERSION:  10.0.19041.1

BUILDLAB_STR:  vb_release

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

FAILURE_ID_HASH:  {1c94a7e8-453f-c7b9-1484-0a0454a0ee36}

Followup:     MachineOwner
---------

Microsoft (R) Windows Debugger Version 10.0.20153.1000 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.


Loading Dump File [C:\Users\CsHay\AppData\Local\Temp\Rar$DIa1672.20527\103120-7484-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available


************* Path validation summary **************
Response                         Time (ms)     Location
Deferred                                       srv*
Symbol search path is: srv*
Executable search path is:
Windows 10 Kernel Version 19041 MP (16 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS
Edition build lab: 19041.1.amd64fre.vb_release.191206-1406
Machine Name:
Kernel base = 0xfffff800`6dc00000 PsLoadedModuleList = 0xfffff800`6e82a310
Debug session time: Sat Oct 31 15:44:32.828 2020 (UTC + 3:00)
System Uptime: 1 days 6:42:07.479
Loading Kernel Symbols
...............................................................
................................................................
................................................................
.............
Loading User Symbols
Loading unloaded module list
..............
For analysis of this file, run !analyze -v
nt!KeBugCheckEx:
fffff800`6dff45a0 48894c2408      mov     qword ptr [rsp+8],rcx ss:0018:ffffe203`f443ea00=0000000000000116
6: kd> !analyze -v
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

VIDEO_TDR_FAILURE (116)
Attempt to reset the display driver and recover from timeout failed.
Arguments:
Arg1: ffffa60567fc5010, Optional pointer to internal TDR recovery context (TDR_RECOVERY_CONTEXT).
Arg2: fffff800826d2230, The pointer into responsible device driver module (e.g. owner tag).
Arg3: ffffffffc0000001, Optional error code (NTSTATUS) of the last failed operation.
Arg4: 0000000000000003, Optional internal context dependent data.

Debugging Details:
------------------

Unable to load image \SystemRoot\System32\DriverStore\FileRepository\u0360073.inf_amd64_4d0a7206a56b4676\B360064\amdkmdag.sys, Win32 error 0n2
*** WARNING: Unable to verify timestamp for amdkmdag.sys
*** WARNING: Unable to verify timestamp for win32k.sys

KEY_VALUES_STRING: 1

    Key  : Analysis.CPU.mSec
    Value: 4734

    Key  : Analysis.DebugAnalysisProvider.CPP
    Value: Create: 8007007e on DESKTOP-IPC9T25

    Key  : Analysis.DebugData
    Value: CreateObject

    Key  : Analysis.DebugModel
    Value: CreateObject

    Key  : Analysis.Elapsed.mSec
    Value: 22521

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 83

    Key  : Analysis.System
    Value: CreateObject

    Key  : WER.OS.Branch
    Value: vb_release

    Key  : WER.OS.Timestamp
    Value: 2019-12-06T14:06:00Z

    Key  : WER.OS.Version
    Value: 10.0.19041.1


ADDITIONAL_XML: 1

OS_BUILD_LAYERS: 1

BUGCHECK_CODE:  116

BUGCHECK_P1: ffffa60567fc5010

BUGCHECK_P2: fffff800826d2230

BUGCHECK_P3: ffffffffc0000001

BUGCHECK_P4: 3

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXPNP: 1 (!blackboxpnp)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  System

STACK_TEXT: 
ffffe203`f443e9f8 fffff800`7c3014be     : 00000000`00000116 ffffa605`67fc5010 fffff800`826d2230 ffffffff`c0000001 : nt!KeBugCheckEx
ffffe203`f443ea00 fffff800`7c2a98db     : fffff800`826d2230 ffffa605`5f76b000 ffffa605`5f76b0f0 00000000`00000000 : dxgkrnl!TdrBugcheckOnTimeout+0xfe
ffffe203`f443ea40 fffff800`7c2aa6ae     : ffffa605`00000101 00000000`00002000 ffffa605`5f76b000 00000000`01000000 : dxgkrnl!DXGADAPTER::PrepareToReset+0x1a3
ffffe203`f443ea90 fffff800`7c300be5     : 00000000`00000100 ffffa605`5f76ba58 00000000`00000000 00000000`00000000 : dxgkrnl!DXGADAPTER::Reset+0x28e
ffffe203`f443eb10 fffff800`7c300d57     : fffff800`6e925440 ffffa605`618aeed0 00000000`00000000 00000000`00000700 : dxgkrnl!TdrResetFromTimeout+0x15
ffffe203`f443eb40 fffff800`6df035f5     : ffffa605`6fff9040 fffff800`7c300d30 ffffa605`5249b430 ffffa605`00000000 : dxgkrnl!TdrResetFromTimeoutWorkItem+0x27
ffffe203`f443eb70 fffff800`6dea2ae5     : ffffa605`6fff9040 00000000`00000080 ffffa605`5248f040 3c928000`3c840000 : nt!ExpWorkerThread+0x105
ffffe203`f443ec10 fffff800`6dffbbf8     : fffff800`693ab180 ffffa605`6fff9040 fffff800`6dea2a90 bb8c0000`bbb80000 : nt!PspSystemThreadStartup+0x55
ffffe203`f443ec60 00000000`00000000     : ffffe203`f443f000 ffffe203`f4439000 00000000`00000000 00000000`00000000 : nt!KiStartSystemThread+0x28


SYMBOL_NAME:  amdkmdag+b2230

MODULE_NAME: amdkmdag

IMAGE_NAME:  amdkmdag.sys

STACK_COMMAND:  .thread ; .cxr ; kb

FAILURE_BUCKET_ID:  0x116_IMAGE_amdkmdag.sys

OS_VERSION:  10.0.19041.1

BUILDLAB_STR:  vb_release

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

FAILURE_ID_HASH:  {1c94a7e8-453f-c7b9-1484-0a0454a0ee36}

Followup:     MachineOwner
---------
 
Son düzenleme:
  1. Ekran kartı sürücünüzü DDU ile kaldırıp WHQL sürüm yükleyin.
  2. Ekran kartınızı OCCT ile test edin sürücü işleminden sonra.
  3. Yüklü olan Android emulatörleri kaldırın.
  4. Riot Vanguard'ı kaldırın.

1. işlemi yaptım. OCCT dediğiniz şey nedir acaba?
Daha önce kullandığım Android emülatörleri vardı. Onları kaldırdım ama acaba kırıntı bırakmış olabilirler mi? Öyleyse detaylı temizlik nasıl yapabilirim?
Herhangi bir overclock yapmadım.
 
Son düzenleyen: Moderatör:
Farklı bir durum görürsem ilk mesajıma eklemeler yaparım, orayı kontrol edin. OCCT sistem için stabilite ve test programıdır. Kullanımı ile alakalı sonsuz kaynak mevcut adını dahi yazmanız yeterli.

Tüm emulatörleri kaldırdığınıza emin olun, CCleaner'ı eskisi kadar önermesem de kullanıp tekrar silebilirsiniz. Silmenizi tavsiye ederim kullanımınızdan sonra.

Ve söylediğim işlemleri atlamadan yapın lütfen. Daha önce yapmış olduklarınızı dahi topluca bir kez daha yapın.

Yine hata alırsanız AIDA64 ile rapor oluşturun ve yeni oluşan minidump dosyanızla birlikte paylaşın.

AIDA64 Rapor Oluşturma
 
Son düzenleme:
  1. Ekran kartı sürücünüzü DDU ile kaldırıp WHQL sürüm yükleyin.
  2. GPU Tweak programını kaldırın ve yaptıysanız tüm OC işlemlerini geri alın. Buna sadece ekran kartı değil, RAM ve işlemci de dahil.
  3. Ekran kartınızı OCCT ile test edin sürücü işleminden sonra.
  4. Yüklü olan Android emulatörleri kaldırın.
  5. Riot Vanguard'ı kaldırın.

Atmış olduğunuz 5 dosyanın 2 tanesi oluşmamış, arızalı. Diğer dosyalarda ise gördüklerim bunlar.

Kod:
Microsoft (R) Windows Debugger Version 10.0.20153.1000 AMD64.
Copyright (c) Microsoft Corporation. All rights reserved.

Loading Dump File [C:\Users\CsHay\AppData\Local\Temp\Rar$DIa1672.21833\102520-11281-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available.

************* Path validation summary **************
Response Time (ms) Location.
Deferred srv*
Symbol search path is: srv*
Executable search path is:
Windows 10 Kernel Version 19041 MP (16 procs) Free x64.
Product: WinNt, suite: TerminalServer SingleUserTS.
Edition build lab: 19041.1.amd64fre.vb_release.191206-1406.
Machine Name:
Kernel base = 0xfffff801`2b200000 PsLoadedModuleList = 0xfffff801`2be2a310.
Debug session time: Sun Oct 25 13:30:47.458 2020 (UTC + 3:00)
System Uptime: 1 days 13:59:16.111.
Loading Kernel Symbols.
...............................................................
................................................................
................................................................
..............
Loading User Symbols.
Loading unloaded module list.
...........
For analysis of this file, run !analyze -v.
nt!KeBugCheckEx:
fffff801`2b5f45a0 48894c2408 mov qword ptr [rsp+8],rcx ss:0018:ffffdb06`ef3158b0=000000000000003b.
2: kd> !analyze -v.
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************

SYSTEM_SERVICE_EXCEPTION (3b)
An exception happened while executing a system service routine.
Arguments:
Arg1: 00000000c0000005, Exception code that caused the bugcheck.
Arg2: fffff8012b4c971b, Address of the instruction which caused the bugcheck.
Arg3: ffffdb06ef3161b0, Address of the context record for the exception that caused the bugcheck.
Arg4: 0000000000000000, zero.

Debugging Details:
------------------

KEY_VALUES_STRING: 1.

Key : Analysis.CPU.mSec.
Value: 5718.

Key : Analysis.DebugAnalysisProvider.CPP.
Value: Create: 8007007e on DESKTOP-IPC9T25.

Key : Analysis.DebugData.
Value: CreateObject.

Key : Analysis.DebugModel.
Value: CreateObject.

Key : Analysis.Elapsed.mSec.
Value: 18360.

Key : Analysis.Memory.CommitPeak.Mb.
Value: 85.

Key : Analysis.System.
Value: CreateObject.

Key : WER.OS.Branch.
Value: vb_release.

Key : WER.OS.Timestamp.
Value: 2019-12-06T14:06:00Z.

Key : WER.OS.Version.
Value: 10.0.19041.1.

ADDITIONAL_XML: 1.

OS_BUILD_LAYERS: 1.

BUGCHECK_CODE: 3b.

BUGCHECK_P1: c0000005.

BUGCHECK_P2: fffff8012b4c971b.

BUGCHECK_P3: ffffdb06ef3161b0.

BUGCHECK_P4: 0.

CONTEXT: ffffdb06ef3161b0 -- (.cxr 0xffffdb06ef3161b0)
rax=6c9940aa68e4006a rbx=ffffb488a4600290 rcx=ffffb488a9370d38.
rdx=ffffb488a4e5dd88 rsi=0000000000000000 rdi=6c9940aa68e4006a.
rip=fffff8012b4c971b rsp=ffffdb06ef316bb8 rbp=ffffdb06ef316c48.
r8=ffffb488ad315ba8 r9=ffffb488ad315ba8 r10=0000000000000000.
r11=ffffb488c10918c8 r12=0000000000000000 r13=ffffb488a4e53000.
r14=0000000000000000 r15=0000000000000026.
iopl=0 nv up ei pl zr na po nc.
cs=0010 ss=0018 ds=002b es=002b fs=0053 gs=002b efl=00050246.
nt!RtlRbRemoveNode+0x39b:
fffff801`2b4c971b 488b07 mov rax,qword ptr [rdi] ds:002b:6c9940aa`68e4006a=????????????????
Resetting default scope.

BLACKBOXBSD: 1 (!blackboxbsd)

BLACKBOXNTFS: 1 (!blackboxntfs)

BLACKBOXPNP: 1 (!blackboxpnp)

BLACKBOXWINLOGON: 1.

CUSTOMER_CRASH_COUNT: 1.

PROCESS_NAME: lsass.exe.

STACK_TEXT:
ffffdb06`ef316bb8 fffff801`2b4c7ce5 : ffffdb06`ef316c48 00000000`00000022 ffffb488`a4e5dd80 00000000`00000026 : nt!RtlRbRemoveNode+0x39b.
ffffdb06`ef316bd0 fffff801`2b4c7aca : ffff2765`00000002 ffffc78d`c88e91a0 ffffc78d`d3937b20 00000000`00000250 : nt!RtlpHpVsChunkSplit+0x45.
ffffdb06`ef316c90 fffff801`2b4cb048 : 00000000`00000000 ffffdb06`00000210 ffffdb06`ef316dd1 00000000`00000210 : nt!RtlpHpVsContextAllocateInternal+0x1fa.
ffffdb06`ef316cf0 fffff801`2b4ca78f : ffffdb06`00000000 00000000`00000005 00000000`74536d4d fffff801`2b80ba0a : nt!ExAllocateHeapPool+0x888.
ffffdb06`ef316e30 fffff801`2b54ff76 : 00000000`80000000 00000000`00000200 00000000`74536d4d ffffc78d`00000000 : nt!ExpAllocatePoolWithTagFromNode+0x5f.
ffffdb06`ef316e80 fffff801`2b513107 : 00000000`00000000 ffffdb06`ef316f40 00000000`00000040 ffffdb06`08000000 : nt!MiAllocatePool+0x86.
ffffdb06`ef316ed0 fffff801`2b550fc2 : ffffffff`ffffffff ffffffff`ffffffff ffffc78d`d563cad0 fffff801`00000000 : nt!MiCreatePrototypePtes+0x53.
ffffdb06`ef316f80 fffff801`2b507f34 : 00000000`00000001 00000000`00000040 00000000`00000000 fffff801`00000040 : nt!MiAddViewsForSection+0x3c2.
ffffdb06`ef317080 fffff801`2b5093fe : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!MmMapViewInSystemCache+0xc4.
ffffdb06`ef317200 fffff801`2b53767a : 00000000`00000000 fffff801`00000000 ffffc78d`00000000 ffffdb06`00000000 : nt!CcGetVacbMiss+0xce.
ffffdb06`ef317290 fffff801`2b900890 : ffffc78d`00000000 00000000`00000000 ffffdb06`ef3173d0 ffffdb06`ef3173e0 : nt!CcGetVirtualAddress+0x33a.
ffffdb06`ef317330 fffff801`2b536c89 : 00000000`00000000 00000000`00000000 00000000`00000000 fffff801`2b48dd01 : nt!CcMapAndCopyFromCache+0x80.
ffffdb06`ef3173d0 fffff801`2e3c36bf : ffffb488`00000000 ffffb488`00000000 ffffb488`0000000c ffffb488`00000000 : nt!CcCopyReadEx+0x139.
ffffdb06`ef317480 fffff801`2e3c511f : ffffb488`ae4c18f0 ffffdb06`ef317720 00000000`00000003 ffffb488`ae4c1700 : Ntfs!NtfsCachedRead+0x177.
ffffdb06`ef3174f0 fffff801`2e3c40cc : ffffc78d`d44c0cc8 ffffc78d`d5357010 ffffc78d`00000001 ffffc78d`0000000c : Ntfs!NtfsCommonRead+0xe1f.
ffffdb06`ef3176f0 fffff801`2b4cd805 : ffffc78d`d519d010 ffffc78d`d5357010 ffffc78d`d5357010 ffffc78d`c876ed60 : Ntfs!NtfsFsdRead+0x1fc.
ffffdb06`ef3177c0 fffff801`28376ccf : ffffc78d`d528b010 00000000`00000000 00000000`00000000 ffffc78d`d528b010 : nt!IofCallDriver+0x55.
ffffdb06`ef317800 fffff801`283748d3 : ffffdb06`ef317890 00000000`00000000 ffffdb06`ef3178b8 fffff801`2b8efe11 : FLTMGR!FltpLegacyProcessingAfterPreCallbacksCompleted+0x28f.
ffffdb06`ef317870 fffff801`2b4cd805 : ffffc78d`d5357010 00000000`00000000 ffffdb06`ef317b80 00000000`00000000 : FLTMGR!FltpDispatch+0xa3.
ffffdb06`ef3178d0 fffff801`2b8c2528 : 00000000`00000000 ffffc78d`d6e0b4c0 00000000`00000001 ffffc78d`c2aff201 : nt!IofCallDriver+0x55.
ffffdb06`ef317910 fffff801`2b8b99d9 : ffffc78d`00000000 ffffdb06`ef317b80 00000000`00000000 ffffdb06`ef317b80 : nt!IopSynchronousServiceTail+0x1a8.
ffffdb06`ef3179b0 fffff801`2b605fb8 : 00000000`00001af8 00000000`00000000 00000000`00000000 00000000`00000000 : nt!NtReadFile+0x599.
ffffdb06`ef317a90 00007fff`6b5ebe54 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x28.
0000008b`ec4fe318 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007fff`6b5ebe54.

SYMBOL_NAME: nt!RtlRbRemoveNode+39b.

MODULE_NAME: nt.

IMAGE_NAME: ntkrnlmp.exe.

IMAGE_VERSION: 10.0.19041.572.

STACK_COMMAND: .cxr 0xffffdb06ef3161b0 ; kb.

BUCKET_ID_FUNC_OFFSET: 39b.

FAILURE_BUCKET_ID: 0x3B_c0000005_nt!RtlRbRemoveNode.

OS_VERSION: 10.0.19041.1.

BUILDLAB_STR: vb_release.

OSPLATFORM_TYPE: x64.

OSNAME: Windows 10.

FAILURE_ID_HASH: {dcc50c37-502a-06f7-586d-2cded5d3c812}

Followup: MachineOwner.
---------

Microsoft (R) Windows Debugger Version 10.0.20153.1000 AMD64.
Copyright (c) Microsoft Corporation. All rights reserved.

Loading Dump File [C:\Users\CsHay\AppData\Local\Temp\Rar$DIa1672.21194\102720-6437-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available.

************* Path validation summary **************
Response Time (ms) Location.
Deferred srv*
Symbol search path is: srv*
Executable search path is:
Windows 10 Kernel Version 19041 MP (16 procs) Free x64.
Product: WinNt, suite: TerminalServer SingleUserTS.
Edition build lab: 19041.1.amd64fre.vb_release.191206-1406.
Machine Name:
Kernel base = 0xfffff804`1d200000 PsLoadedModuleList = 0xfffff804`1de2a310.
Debug session time: Tue Oct 27 21:22:31.325 2020 (UTC + 3:00)
System Uptime: 0 days 23:06:56.643.
Loading Kernel Symbols.
...............................................................
................................................................
................................................................
.............
Loading User Symbols.
Loading unloaded module list.
.................
For analysis of this file, run !analyze -v.
nt!KeBugCheckEx:
fffff804`1d5f45a0 48894c2408 mov qword ptr [rsp+8],rcx ss:0018:ffffb784`850d8a00=0000000000000116.
1: kd> !analyze -v.
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************

VIDEO_TDR_FAILURE (116)
Attempt to reset the display driver and recover from timeout failed.
Arguments:
Arg1: ffffba092ce7a010, Optional pointer to internal TDR recovery context (TDR_RECOVERY_CONTEXT).
Arg2: fffff80431902230, The pointer into responsible device driver module (e.g. owner tag).
Arg3: ffffffffc0000001, Optional error code (NTSTATUS) of the last failed operation.
Arg4: 0000000000000003, Optional internal context dependent data.

Debugging Details:
------------------

Unable to load image \SystemRoot\System32\DriverStore\FileRepository\u0360073.inf_amd64_4d0a7206a56b4676\B360064\amdkmdag.sys, Win32 error 0n2.
*** WARNING: Unable to verify timestamp for amdkmdag.sys.
*** WARNING: Unable to verify timestamp for win32k.sys.

KEY_VALUES_STRING: 1.

Key : Analysis.CPU.mSec.
Value: 5796.

Key : Analysis.DebugAnalysisProvider.CPP.
Value: Create: 8007007e on DESKTOP-IPC9T25.

Key : Analysis.DebugData.
Value: CreateObject.

Key : Analysis.DebugModel.
Value: CreateObject.

Key : Analysis.Elapsed.mSec.
Value: 30995.

Key : Analysis.Memory.CommitPeak.Mb.
Value: 86.

Key : Analysis.System.
Value: CreateObject.

Key : WER.OS.Branch.
Value: vb_release.

Key : WER.OS.Timestamp.
Value: 2019-12-06T14:06:00Z.

Key : WER.OS.Version.
Value: 10.0.19041.1.

ADDITIONAL_XML: 1.

OS_BUILD_LAYERS: 1.

BUGCHECK_CODE: 116.

BUGCHECK_P1: ffffba092ce7a010.

BUGCHECK_P2: fffff80431902230.

BUGCHECK_P3: ffffffffc0000001.

BUGCHECK_P4: 3.

BLACKBOXBSD: 1 (!blackboxbsd)

BLACKBOXNTFS: 1 (!blackboxntfs)

BLACKBOXPNP: 1 (!blackboxpnp)

BLACKBOXWINLOGON: 1.

CUSTOMER_CRASH_COUNT: 1.

PROCESS_NAME: System.

STACK_TEXT:
ffffb784`850d89f8 fffff804`2ac814be : 00000000`00000116 ffffba09`2ce7a010 fffff804`31902230 ffffffff`c0000001 : nt!KeBugCheckEx.
ffffb784`850d8a00 fffff804`2ac298db : fffff804`31902230 ffffba09`28559000 ffffba09`285590f0 00000000`00000000 : dxgkrnl!TdrBugcheckOnTimeout+0xfe.
ffffb784`850d8a40 fffff804`2ac2a6ae : ffffba09`00000101 00000000`00002000 ffffba09`28559000 00000000`01000000 : dxgkrnl!DXGADAPTER::prepareToReset+0x1a3.
ffffb784`850d8a90 fffff804`2ac80be5 : 00000000`00000100 ffffba09`28559a58 00000000`00000000 00000000`00000300 : dxgkrnl!DXGADAPTER::Reset+0x28e.
ffffb784`850d8b10 fffff804`2ac80d57 : fffff804`1df25440 00000000`00000000 00000000`00000000 00000000`00000300 : dxgkrnl!TdrResetFromTimeout+0x15.
ffffb784`850d8b40 fffff804`1d5035f5 : ffffba09`30d9e040 fffff804`2ac80d30 ffffba09`19284ce0 ffffba09`00000000 : dxgkrnl!TdrResetFromTimeoutWorkItem+0x27.
ffffb784`850d8b70 fffff804`1d4a2ae5 : ffffba09`30d9e040 00000000`00000080 ffffba09`192a7040 ba07c3b6`b9cba591 : nt!ExpWorkerThread+0x105.
ffffb784`850d8c10 fffff804`1d5fbbf8 : ffff9780`eed9c180 ffffba09`30d9e040 fffff804`1d4a2a90 ba98bc2d`ba821b8f : nt!PspSystemThreadStartup+0x55.
ffffb784`850d8c60 00000000`00000000 : ffffb784`850d9000 ffffb784`850d3000 00000000`00000000 00000000`00000000 : nt!KiStartSystemThread+0x28.

SYMBOL_NAME: amdkmdag+b2230.

MODULE_NAME: amdkmdag.

IMAGE_NAME: amdkmdag.sys.

STACK_COMMAND: .thread ; .cxr ; kb.

FAILURE_BUCKET_ID: 0x116_IMAGE_amdkmdag.sys.

OS_VERSION: 10.0.19041.1.

BUILDLAB_STR: vb_release.

OSPLATFORM_TYPE: x64.

OSNAME: Windows 10.

FAILURE_ID_HASH: {1c94a7e8-453f-c7b9-1484-0a0454a0ee36}

Followup: MachineOwner.
---------

1: kd> !analyze -v.
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************

VIDEO_TDR_FAILURE (116)
Attempt to reset the display driver and recover from timeout failed.
Arguments:
Arg1: ffffba092ce7a010, Optional pointer to internal TDR recovery context (TDR_RECOVERY_CONTEXT).
Arg2: fffff80431902230, The pointer into responsible device driver module (e.g. owner tag).
Arg3: ffffffffc0000001, Optional error code (NTSTATUS) of the last failed operation.
Arg4: 0000000000000003, Optional internal context dependent data.

Debugging Details:
------------------

KEY_VALUES_STRING: 1.

Key : Analysis.CPU.mSec.
Value: 3546.

Key : Analysis.DebugAnalysisProvider.CPP.
Value: Create: 8007007e on DESKTOP-IPC9T25.

Key : Analysis.DebugData.
Value: CreateObject.

Key : Analysis.DebugModel.
Value: CreateObject.

Key : Analysis.Elapsed.mSec.
Value: 10921.

Key : Analysis.Memory.CommitPeak.Mb.
Value: 86.

Key : Analysis.System.
Value: CreateObject.

Key : WER.OS.Branch.
Value: vb_release.

Key : WER.OS.Timestamp.
Value: 2019-12-06T14:06:00Z.

Key : WER.OS.Version.
Value: 10.0.19041.1.

ADDITIONAL_XML: 1.

OS_BUILD_LAYERS: 1.

BUGCHECK_CODE: 116.

BUGCHECK_P1: ffffba092ce7a010.

BUGCHECK_P2: fffff80431902230.

BUGCHECK_P3: ffffffffc0000001.

BUGCHECK_P4: 3.

BLACKBOXBSD: 1 (!blackboxbsd)

BLACKBOXNTFS: 1 (!blackboxntfs)

BLACKBOXPNP: 1 (!blackboxpnp)

BLACKBOXWINLOGON: 1.

CUSTOMER_CRASH_COUNT: 1.

PROCESS_NAME: System.

STACK_TEXT:
ffffb784`850d89f8 fffff804`2ac814be : 00000000`00000116 ffffba09`2ce7a010 fffff804`31902230 ffffffff`c0000001 : nt!KeBugCheckEx.
ffffb784`850d8a00 fffff804`2ac298db : fffff804`31902230 ffffba09`28559000 ffffba09`285590f0 00000000`00000000 : dxgkrnl!TdrBugcheckOnTimeout+0xfe.
ffffb784`850d8a40 fffff804`2ac2a6ae : ffffba09`00000101 00000000`00002000 ffffba09`28559000 00000000`01000000 : dxgkrnl!DXGADAPTER::prepareToReset+0x1a3.
ffffb784`850d8a90 fffff804`2ac80be5 : 00000000`00000100 ffffba09`28559a58 00000000`00000000 00000000`00000300 : dxgkrnl!DXGADAPTER::Reset+0x28e.
ffffb784`850d8b10 fffff804`2ac80d57 : fffff804`1df25440 00000000`00000000 00000000`00000000 00000000`00000300 : dxgkrnl!TdrResetFromTimeout+0x15.
ffffb784`850d8b40 fffff804`1d5035f5 : ffffba09`30d9e040 fffff804`2ac80d30 ffffba09`19284ce0 ffffba09`00000000 : dxgkrnl!TdrResetFromTimeoutWorkItem+0x27.
ffffb784`850d8b70 fffff804`1d4a2ae5 : ffffba09`30d9e040 00000000`00000080 ffffba09`192a7040 ba07c3b6`b9cba591 : nt!ExpWorkerThread+0x105.
ffffb784`850d8c10 fffff804`1d5fbbf8 : ffff9780`eed9c180 ffffba09`30d9e040 fffff804`1d4a2a90 ba98bc2d`ba821b8f : nt!PspSystemThreadStartup+0x55.
ffffb784`850d8c60 00000000`00000000 : ffffb784`850d9000 ffffb784`850d3000 00000000`00000000 00000000`00000000 : nt!KiStartSystemThread+0x28.

SYMBOL_NAME: amdkmdag+b2230.

MODULE_NAME: amdkmdag.

IMAGE_NAME: amdkmdag.sys.

STACK_COMMAND: .thread ; .cxr ; kb.

FAILURE_BUCKET_ID: 0x116_IMAGE_amdkmdag.sys.

OS_VERSION: 10.0.19041.1.

BUILDLAB_STR: vb_release.

OSPLATFORM_TYPE: x64.

OSNAME: Windows 10.

FAILURE_ID_HASH: {1c94a7e8-453f-c7b9-1484-0a0454a0ee36}

Followup: MachineOwner.
---------

Microsoft (R) Windows Debugger Version 10.0.20153.1000 AMD64.
Copyright (c) Microsoft Corporation. All rights reserved.

Loading Dump File [C:\Users\CsHay\AppData\Local\Temp\Rar$DIa1672.20527\103120-7484-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available.

************* Path validation summary **************
Response Time (ms) Location.
Deferred srv*
Symbol search path is: srv*
Executable search path is:
Windows 10 Kernel Version 19041 MP (16 procs) Free x64.
Product: WinNt, suite: TerminalServer SingleUserTS.
Edition build lab: 19041.1.amd64fre.vb_release.191206-1406.
Machine Name:
Kernel base = 0xfffff800`6dc00000 PsLoadedModuleList = 0xfffff800`6e82a310.
Debug session time: Sat Oct 31 15:44:32.828 2020 (UTC + 3:00)
System Uptime: 1 days 6:42:07.479.
Loading Kernel Symbols.
...............................................................
................................................................
................................................................
.............
Loading User Symbols.
Loading unloaded module list.
..............
For analysis of this file, run !analyze -v.
nt!KeBugCheckEx:
fffff800`6dff45a0 48894c2408 mov qword ptr [rsp+8],rcx ss:0018:ffffe203`f443ea00=0000000000000116.
6: kd> !analyze -v.
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************

VIDEO_TDR_FAILURE (116)
Attempt to reset the display driver and recover from timeout failed.
Arguments:
Arg1: ffffa60567fc5010, Optional pointer to internal TDR recovery context (TDR_RECOVERY_CONTEXT).
Arg2: fffff800826d2230, The pointer into responsible device driver module (e.g. owner tag).
Arg3: ffffffffc0000001, Optional error code (NTSTATUS) of the last failed operation.
Arg4: 0000000000000003, Optional internal context dependent data.

Debugging Details:
------------------

Unable to load image \SystemRoot\System32\DriverStore\FileRepository\u0360073.inf_amd64_4d0a7206a56b4676\B360064\amdkmdag.sys, Win32 error 0n2.
*** WARNING: Unable to verify timestamp for amdkmdag.sys.
*** WARNING: Unable to verify timestamp for win32k.sys.

KEY_VALUES_STRING: 1.

Key : Analysis.CPU.mSec.
Value: 4734.

Key : Analysis.DebugAnalysisProvider.CPP.
Value: Create: 8007007e on DESKTOP-IPC9T25.

Key : Analysis.DebugData.
Value: CreateObject.

Key : Analysis.DebugModel.
Value: CreateObject.

Key : Analysis.Elapsed.mSec.
Value: 22521.

Key : Analysis.Memory.CommitPeak.Mb.
Value: 83.

Key : Analysis.System.
Value: CreateObject.

Key : WER.OS.Branch.
Value: vb_release.

Key : WER.OS.Timestamp.
Value: 2019-12-06T14:06:00Z.

Key : WER.OS.Version.
Value: 10.0.19041.1.

ADDITIONAL_XML: 1.

OS_BUILD_LAYERS: 1.

BUGCHECK_CODE: 116.

BUGCHECK_P1: ffffa60567fc5010.

BUGCHECK_P2: fffff800826d2230.

BUGCHECK_P3: ffffffffc0000001.

BUGCHECK_P4: 3.

BLACKBOXBSD: 1 (!blackboxbsd)

BLACKBOXNTFS: 1 (!blackboxntfs)

BLACKBOXPNP: 1 (!blackboxpnp)

BLACKBOXWINLOGON: 1.

CUSTOMER_CRASH_COUNT: 1.

PROCESS_NAME: System.

STACK_TEXT:
ffffe203`f443e9f8 fffff800`7c3014be : 00000000`00000116 ffffa605`67fc5010 fffff800`826d2230 ffffffff`c0000001 : nt!KeBugCheckEx.
ffffe203`f443ea00 fffff800`7c2a98db : fffff800`826d2230 ffffa605`5f76b000 ffffa605`5f76b0f0 00000000`00000000 : dxgkrnl!TdrBugcheckOnTimeout+0xfe.
ffffe203`f443ea40 fffff800`7c2aa6ae : ffffa605`00000101 00000000`00002000 ffffa605`5f76b000 00000000`01000000 : dxgkrnl!DXGADAPTER::prepareToReset+0x1a3.
ffffe203`f443ea90 fffff800`7c300be5 : 00000000`00000100 ffffa605`5f76ba58 00000000`00000000 00000000`00000000 : dxgkrnl!DXGADAPTER::Reset+0x28e.
ffffe203`f443eb10 fffff800`7c300d57 : fffff800`6e925440 ffffa605`618aeed0 00000000`00000000 00000000`00000700 : dxgkrnl!TdrResetFromTimeout+0x15.
ffffe203`f443eb40 fffff800`6df035f5 : ffffa605`6fff9040 fffff800`7c300d30 ffffa605`5249b430 ffffa605`00000000 : dxgkrnl!TdrResetFromTimeoutWorkItem+0x27.
ffffe203`f443eb70 fffff800`6dea2ae5 : ffffa605`6fff9040 00000000`00000080 ffffa605`5248f040 3c928000`3c840000 : nt!ExpWorkerThread+0x105.
ffffe203`f443ec10 fffff800`6dffbbf8 : fffff800`693ab180 ffffa605`6fff9040 fffff800`6dea2a90 bb8c0000`bbb80000 : nt!PspSystemThreadStartup+0x55.
ffffe203`f443ec60 00000000`00000000 : ffffe203`f443f000 ffffe203`f4439000 00000000`00000000 00000000`00000000 : nt!KiStartSystemThread+0x28.

SYMBOL_NAME: amdkmdag+b2230.

MODULE_NAME: amdkmdag.

IMAGE_NAME: amdkmdag.sys.

STACK_COMMAND: .thread ; .cxr ; kb.

FAILURE_BUCKET_ID: 0x116_IMAGE_amdkmdag.sys.

OS_VERSION: 10.0.19041.1.

BUILDLAB_STR: vb_release.

OSPLATFORM_TYPE: x64.

OSNAME: Windows 10.

FAILURE_ID_HASH: {1c94a7e8-453f-c7b9-1484-0a0454a0ee36}

Followup: MachineOwner.
---------

Hocam bende GPU Tweak diye bir uygulama yok.
 
Kullanmadığınız tüm ASUS programlarını kaldırın, hatta tedbir amaçlı tamamını kaldırabilirsiniz. Direkt olarak yoksa bile içlerinde bir tanesi aynı dosyayı kullanıyor. Az çok kestirebilirsiniz, ekran kartınızın değerleri ile oynamanıza yarayan bir yazılımı ASUS'un. ASUS PC Probe'da olabilir.

MsIo64.sys
 
AMD Chipset Software ve AMD Ryzen master ı da kaldırıyım mı?
Ayrıca ASUS Freamwork Service, ASUS Motherboard, Aura lightning effect add-on,Aura lightning effect add-on*64 programlarını da kaldırabilir miyim. Hiçbirini kullanmıyorum ama bilgisayarın çalışması için vs. önemli olan var mı?
 
Chipset haricinde kaldırabilirsiniz yazdıklarınızı.
Yukarıda diğer söylediklerimle birlikte durumu bir süre gözlemleyin. Yine hata alırsanız daha önce de belirttiğim gibi AIDA64 ve minidump dosyanızı birlikte paylaşın.
 

Geri
Yukarı