VIDEO_TDR_FAILURE (116) mavi ekran hatası

NiqhtMegatron

Hectopat
Katılım
7 Haziran 2020
Mesajlar
441
Çözümler
3

Arkadaşlar yukarıda şu ana kadar oluşan bütün minidump dosyalarını paylaştım. Acaba vakit ayırıp bakabilir misiniz? Sorunu uzun zamandır çözemedim.

Sistem: Ryzen 7 3700 X, RX 5700 XT, ASUS B550 Prime, 8*2 RAM. 700W Cooler Master 80+

Sorun: Dostlar RDR 2'yi aralıksız 9 saat oynadım ara verdim açık bıraktım vs. hiç sorun olmadı. Ama bazen DC açıkken LoL açıyorum ve önce bilgisayar donuyor, birkaç saniye sonra resetleniyor. Tekrar açılıyor. Yukarıda örnek verdim çünkü sorun kartı zorlamamla alakalı değil. Bazen Far Cry Primal'a girerken oluyor, bazen YouTube açarken. Ama oyun ya da programları açtıktan sonra kapanma sorunu olmuyor. Alt+Tab yaparsam vs. bazen oluyor. Yardımcı olursanız çok sevinirim.
Kartın garantisi devam ediyor ama şu dönemde göndersem ne zaman gelir bilmiyorum. Bir yandan üniversite dersleri de başladı yani elimde uzun süre PC'siz kalabilecek vakit yok.
 
Son düzenleyen: Moderatör:
  1. Ekran kartı sürücünüzü DDU ile kaldırıp WHQL sürüm yükleyin.

  2. GPUTweak programını kaldırın ve yaptıysanız tüm OC işlemlerini geri alın. Buna sadece ekran kartı değil, RAM ve işlemci de dahil.
  3. Ekran kartınızı OCCT ile test edin sürücü işleminden sonra.
  4. Yüklü olan Android emulatörleri kaldırın.
  5. Riot Vanguard'ı kaldırın.

Atmış olduğunuz 5 dosyanın 2 tanesi oluşmamış, arızalı. Diğer dosyalarda ise gördüklerim bunlar.

Kod:
Microsoft (R) Windows Debugger Version 10.0.20153.1000 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.


Loading Dump File [C:\Users\CsHay\AppData\Local\Temp\Rar$DIa1672.21833\102520-11281-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available


************* Path validation summary **************
Response                         Time (ms)     Location
Deferred                                       srv*
Symbol search path is: srv*
Executable search path is:
Windows 10 Kernel Version 19041 MP (16 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS
Edition build lab: 19041.1.amd64fre.vb_release.191206-1406
Machine Name:
Kernel base = 0xfffff801`2b200000 PsLoadedModuleList = 0xfffff801`2be2a310
Debug session time: Sun Oct 25 13:30:47.458 2020 (UTC + 3:00)
System Uptime: 1 days 13:59:16.111
Loading Kernel Symbols
...............................................................
................................................................
................................................................
..............
Loading User Symbols
Loading unloaded module list
...........
For analysis of this file, run !analyze -v
nt!KeBugCheckEx:
fffff801`2b5f45a0 48894c2408      mov     qword ptr [rsp+8],rcx ss:0018:ffffdb06`ef3158b0=000000000000003b
2: kd> !analyze -v
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

SYSTEM_SERVICE_EXCEPTION (3b)
An exception happened while executing a system service routine.
Arguments:
Arg1: 00000000c0000005, Exception code that caused the bugcheck
Arg2: fffff8012b4c971b, Address of the instruction which caused the bugcheck
Arg3: ffffdb06ef3161b0, Address of the context record for the exception that caused the bugcheck
Arg4: 0000000000000000, zero.

Debugging Details:
------------------


KEY_VALUES_STRING: 1

    Key  : Analysis.CPU.mSec
    Value: 5718

    Key  : Analysis.DebugAnalysisProvider.CPP
    Value: Create: 8007007e on DESKTOP-IPC9T25

    Key  : Analysis.DebugData
    Value: CreateObject

    Key  : Analysis.DebugModel
    Value: CreateObject

    Key  : Analysis.Elapsed.mSec
    Value: 18360

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 85

    Key  : Analysis.System
    Value: CreateObject

    Key  : WER.OS.Branch
    Value: vb_release

    Key  : WER.OS.Timestamp
    Value: 2019-12-06T14:06:00Z

    Key  : WER.OS.Version
    Value: 10.0.19041.1


ADDITIONAL_XML: 1

OS_BUILD_LAYERS: 1

BUGCHECK_CODE:  3b

BUGCHECK_P1: c0000005

BUGCHECK_P2: fffff8012b4c971b

BUGCHECK_P3: ffffdb06ef3161b0

BUGCHECK_P4: 0

CONTEXT:  ffffdb06ef3161b0 -- (.cxr 0xffffdb06ef3161b0)
rax=6c9940aa68e4006a rbx=ffffb488a4600290 rcx=ffffb488a9370d38
rdx=ffffb488a4e5dd88 rsi=0000000000000000 rdi=6c9940aa68e4006a
rip=fffff8012b4c971b rsp=ffffdb06ef316bb8 rbp=ffffdb06ef316c48
r8=ffffb488ad315ba8  r9=ffffb488ad315ba8 r10=0000000000000000
r11=ffffb488c10918c8 r12=0000000000000000 r13=ffffb488a4e53000
r14=0000000000000000 r15=0000000000000026
iopl=0         nv up ei pl zr na po nc
cs=0010  ss=0018  ds=002b  es=002b  fs=0053  gs=002b             efl=00050246
nt!RtlRbRemoveNode+0x39b:
fffff801`2b4c971b 488b07          mov     rax,qword ptr [rdi] ds:002b:6c9940aa`68e4006a=????????????????
Resetting default scope

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXPNP: 1 (!blackboxpnp)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  lsass.exe

STACK_TEXT:
ffffdb06`ef316bb8 fffff801`2b4c7ce5     : ffffdb06`ef316c48 00000000`00000022 ffffb488`a4e5dd80 00000000`00000026 : nt!RtlRbRemoveNode+0x39b
ffffdb06`ef316bd0 fffff801`2b4c7aca     : ffff2765`00000002 ffffc78d`c88e91a0 ffffc78d`d3937b20 00000000`00000250 : nt!RtlpHpVsChunkSplit+0x45
ffffdb06`ef316c90 fffff801`2b4cb048     : 00000000`00000000 ffffdb06`00000210 ffffdb06`ef316dd1 00000000`00000210 : nt!RtlpHpVsContextAllocateInternal+0x1fa
ffffdb06`ef316cf0 fffff801`2b4ca78f     : ffffdb06`00000000 00000000`00000005 00000000`74536d4d fffff801`2b80ba0a : nt!ExAllocateHeapPool+0x888
ffffdb06`ef316e30 fffff801`2b54ff76     : 00000000`80000000 00000000`00000200 00000000`74536d4d ffffc78d`00000000 : nt!ExpAllocatePoolWithTagFromNode+0x5f
ffffdb06`ef316e80 fffff801`2b513107     : 00000000`00000000 ffffdb06`ef316f40 00000000`00000040 ffffdb06`08000000 : nt!MiAllocatePool+0x86
ffffdb06`ef316ed0 fffff801`2b550fc2     : ffffffff`ffffffff ffffffff`ffffffff ffffc78d`d563cad0 fffff801`00000000 : nt!MiCreatePrototypePtes+0x53
ffffdb06`ef316f80 fffff801`2b507f34     : 00000000`00000001 00000000`00000040 00000000`00000000 fffff801`00000040 : nt!MiAddViewsForSection+0x3c2
ffffdb06`ef317080 fffff801`2b5093fe     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!MmMapViewInSystemCache+0xc4
ffffdb06`ef317200 fffff801`2b53767a     : 00000000`00000000 fffff801`00000000 ffffc78d`00000000 ffffdb06`00000000 : nt!CcGetVacbMiss+0xce
ffffdb06`ef317290 fffff801`2b900890     : ffffc78d`00000000 00000000`00000000 ffffdb06`ef3173d0 ffffdb06`ef3173e0 : nt!CcGetVirtualAddress+0x33a
ffffdb06`ef317330 fffff801`2b536c89     : 00000000`00000000 00000000`00000000 00000000`00000000 fffff801`2b48dd01 : nt!CcMapAndCopyFromCache+0x80
ffffdb06`ef3173d0 fffff801`2e3c36bf     : ffffb488`00000000 ffffb488`00000000 ffffb488`0000000c ffffb488`00000000 : nt!CcCopyReadEx+0x139
ffffdb06`ef317480 fffff801`2e3c511f     : ffffb488`ae4c18f0 ffffdb06`ef317720 00000000`00000003 ffffb488`ae4c1700 : Ntfs!NtfsCachedRead+0x177
ffffdb06`ef3174f0 fffff801`2e3c40cc     : ffffc78d`d44c0cc8 ffffc78d`d5357010 ffffc78d`00000001 ffffc78d`0000000c : Ntfs!NtfsCommonRead+0xe1f
ffffdb06`ef3176f0 fffff801`2b4cd805     : ffffc78d`d519d010 ffffc78d`d5357010 ffffc78d`d5357010 ffffc78d`c876ed60 : Ntfs!NtfsFsdRead+0x1fc
ffffdb06`ef3177c0 fffff801`28376ccf     : ffffc78d`d528b010 00000000`00000000 00000000`00000000 ffffc78d`d528b010 : nt!IofCallDriver+0x55
ffffdb06`ef317800 fffff801`283748d3     : ffffdb06`ef317890 00000000`00000000 ffffdb06`ef3178b8 fffff801`2b8efe11 : FLTMGR!FltpLegacyProcessingAfterPreCallbacksCompleted+0x28f
ffffdb06`ef317870 fffff801`2b4cd805     : ffffc78d`d5357010 00000000`00000000 ffffdb06`ef317b80 00000000`00000000 : FLTMGR!FltpDispatch+0xa3
ffffdb06`ef3178d0 fffff801`2b8c2528     : 00000000`00000000 ffffc78d`d6e0b4c0 00000000`00000001 ffffc78d`c2aff201 : nt!IofCallDriver+0x55
ffffdb06`ef317910 fffff801`2b8b99d9     : ffffc78d`00000000 ffffdb06`ef317b80 00000000`00000000 ffffdb06`ef317b80 : nt!IopSynchronousServiceTail+0x1a8
ffffdb06`ef3179b0 fffff801`2b605fb8     : 00000000`00001af8 00000000`00000000 00000000`00000000 00000000`00000000 : nt!NtReadFile+0x599
ffffdb06`ef317a90 00007fff`6b5ebe54     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x28
0000008b`ec4fe318 00000000`00000000     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007fff`6b5ebe54


SYMBOL_NAME:  nt!RtlRbRemoveNode+39b

MODULE_NAME: nt

IMAGE_NAME:  ntkrnlmp.exe

IMAGE_VERSION:  10.0.19041.572

STACK_COMMAND:  .cxr 0xffffdb06ef3161b0 ; kb

BUCKET_ID_FUNC_OFFSET:  39b

FAILURE_BUCKET_ID:  0x3B_c0000005_nt!RtlRbRemoveNode

OS_VERSION:  10.0.19041.1

BUILDLAB_STR:  vb_release

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

FAILURE_ID_HASH:  {dcc50c37-502a-06f7-586d-2cded5d3c812}

Followup:     MachineOwner
---------

Microsoft (R) Windows Debugger Version 10.0.20153.1000 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.


Loading Dump File [C:\Users\CsHay\AppData\Local\Temp\Rar$DIa1672.21194\102720-6437-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available


************* Path validation summary **************
Response                         Time (ms)     Location
Deferred                                       srv*
Symbol search path is: srv*
Executable search path is:
Windows 10 Kernel Version 19041 MP (16 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS
Edition build lab: 19041.1.amd64fre.vb_release.191206-1406
Machine Name:
Kernel base = 0xfffff804`1d200000 PsLoadedModuleList = 0xfffff804`1de2a310
Debug session time: Tue Oct 27 21:22:31.325 2020 (UTC + 3:00)
System Uptime: 0 days 23:06:56.643
Loading Kernel Symbols
...............................................................
................................................................
................................................................
.............
Loading User Symbols
Loading unloaded module list
.................
For analysis of this file, run !analyze -v
nt!KeBugCheckEx:
fffff804`1d5f45a0 48894c2408      mov     qword ptr [rsp+8],rcx ss:0018:ffffb784`850d8a00=0000000000000116
1: kd> !analyze -v
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

VIDEO_TDR_FAILURE (116)
Attempt to reset the display driver and recover from timeout failed.
Arguments:
Arg1: ffffba092ce7a010, Optional pointer to internal TDR recovery context (TDR_RECOVERY_CONTEXT).
Arg2: fffff80431902230, The pointer into responsible device driver module (e.g. owner tag).
Arg3: ffffffffc0000001, Optional error code (NTSTATUS) of the last failed operation.
Arg4: 0000000000000003, Optional internal context dependent data.

Debugging Details:
------------------

Unable to load image \SystemRoot\System32\DriverStore\FileRepository\u0360073.inf_amd64_4d0a7206a56b4676\B360064\amdkmdag.sys, Win32 error 0n2
*** WARNING: Unable to verify timestamp for amdkmdag.sys
*** WARNING: Unable to verify timestamp for win32k.sys

KEY_VALUES_STRING: 1

    Key  : Analysis.CPU.mSec
    Value: 5796

    Key  : Analysis.DebugAnalysisProvider.CPP
    Value: Create: 8007007e on DESKTOP-IPC9T25

    Key  : Analysis.DebugData
    Value: CreateObject

    Key  : Analysis.DebugModel
    Value: CreateObject

    Key  : Analysis.Elapsed.mSec
    Value: 30995

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 86

    Key  : Analysis.System
    Value: CreateObject

    Key  : WER.OS.Branch
    Value: vb_release

    Key  : WER.OS.Timestamp
    Value: 2019-12-06T14:06:00Z

    Key  : WER.OS.Version
    Value: 10.0.19041.1


ADDITIONAL_XML: 1

OS_BUILD_LAYERS: 1

BUGCHECK_CODE:  116

BUGCHECK_P1: ffffba092ce7a010

BUGCHECK_P2: fffff80431902230

BUGCHECK_P3: ffffffffc0000001

BUGCHECK_P4: 3

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXPNP: 1 (!blackboxpnp)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  System

STACK_TEXT:
ffffb784`850d89f8 fffff804`2ac814be     : 00000000`00000116 ffffba09`2ce7a010 fffff804`31902230 ffffffff`c0000001 : nt!KeBugCheckEx
ffffb784`850d8a00 fffff804`2ac298db     : fffff804`31902230 ffffba09`28559000 ffffba09`285590f0 00000000`00000000 : dxgkrnl!TdrBugcheckOnTimeout+0xfe
ffffb784`850d8a40 fffff804`2ac2a6ae     : ffffba09`00000101 00000000`00002000 ffffba09`28559000 00000000`01000000 : dxgkrnl!DXGADAPTER::PrepareToReset+0x1a3
ffffb784`850d8a90 fffff804`2ac80be5     : 00000000`00000100 ffffba09`28559a58 00000000`00000000 00000000`00000300 : dxgkrnl!DXGADAPTER::Reset+0x28e
ffffb784`850d8b10 fffff804`2ac80d57     : fffff804`1df25440 00000000`00000000 00000000`00000000 00000000`00000300 : dxgkrnl!TdrResetFromTimeout+0x15
ffffb784`850d8b40 fffff804`1d5035f5     : ffffba09`30d9e040 fffff804`2ac80d30 ffffba09`19284ce0 ffffba09`00000000 : dxgkrnl!TdrResetFromTimeoutWorkItem+0x27
ffffb784`850d8b70 fffff804`1d4a2ae5     : ffffba09`30d9e040 00000000`00000080 ffffba09`192a7040 ba07c3b6`b9cba591 : nt!ExpWorkerThread+0x105
ffffb784`850d8c10 fffff804`1d5fbbf8     : ffff9780`eed9c180 ffffba09`30d9e040 fffff804`1d4a2a90 ba98bc2d`ba821b8f : nt!PspSystemThreadStartup+0x55
ffffb784`850d8c60 00000000`00000000     : ffffb784`850d9000 ffffb784`850d3000 00000000`00000000 00000000`00000000 : nt!KiStartSystemThread+0x28


SYMBOL_NAME:  amdkmdag+b2230

MODULE_NAME: amdkmdag

IMAGE_NAME:  amdkmdag.sys

STACK_COMMAND:  .thread ; .cxr ; kb

FAILURE_BUCKET_ID:  0x116_IMAGE_amdkmdag.sys

OS_VERSION:  10.0.19041.1

BUILDLAB_STR:  vb_release

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

FAILURE_ID_HASH:  {1c94a7e8-453f-c7b9-1484-0a0454a0ee36}

Followup:     MachineOwner
---------

1: kd> !analyze -v
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

VIDEO_TDR_FAILURE (116)
Attempt to reset the display driver and recover from timeout failed.
Arguments:
Arg1: ffffba092ce7a010, Optional pointer to internal TDR recovery context (TDR_RECOVERY_CONTEXT).
Arg2: fffff80431902230, The pointer into responsible device driver module (e.g. owner tag).
Arg3: ffffffffc0000001, Optional error code (NTSTATUS) of the last failed operation.
Arg4: 0000000000000003, Optional internal context dependent data.

Debugging Details:
------------------


KEY_VALUES_STRING: 1

    Key  : Analysis.CPU.mSec
    Value: 3546

    Key  : Analysis.DebugAnalysisProvider.CPP
    Value: Create: 8007007e on DESKTOP-IPC9T25

    Key  : Analysis.DebugData
    Value: CreateObject

    Key  : Analysis.DebugModel
    Value: CreateObject

    Key  : Analysis.Elapsed.mSec
    Value: 10921

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 86

    Key  : Analysis.System
    Value: CreateObject

    Key  : WER.OS.Branch
    Value: vb_release

    Key  : WER.OS.Timestamp
    Value: 2019-12-06T14:06:00Z

    Key  : WER.OS.Version
    Value: 10.0.19041.1


ADDITIONAL_XML: 1

OS_BUILD_LAYERS: 1

BUGCHECK_CODE:  116

BUGCHECK_P1: ffffba092ce7a010

BUGCHECK_P2: fffff80431902230

BUGCHECK_P3: ffffffffc0000001

BUGCHECK_P4: 3

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXPNP: 1 (!blackboxpnp)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  System

STACK_TEXT:
ffffb784`850d89f8 fffff804`2ac814be     : 00000000`00000116 ffffba09`2ce7a010 fffff804`31902230 ffffffff`c0000001 : nt!KeBugCheckEx
ffffb784`850d8a00 fffff804`2ac298db     : fffff804`31902230 ffffba09`28559000 ffffba09`285590f0 00000000`00000000 : dxgkrnl!TdrBugcheckOnTimeout+0xfe
ffffb784`850d8a40 fffff804`2ac2a6ae     : ffffba09`00000101 00000000`00002000 ffffba09`28559000 00000000`01000000 : dxgkrnl!DXGADAPTER::PrepareToReset+0x1a3
ffffb784`850d8a90 fffff804`2ac80be5     : 00000000`00000100 ffffba09`28559a58 00000000`00000000 00000000`00000300 : dxgkrnl!DXGADAPTER::Reset+0x28e
ffffb784`850d8b10 fffff804`2ac80d57     : fffff804`1df25440 00000000`00000000 00000000`00000000 00000000`00000300 : dxgkrnl!TdrResetFromTimeout+0x15
ffffb784`850d8b40 fffff804`1d5035f5     : ffffba09`30d9e040 fffff804`2ac80d30 ffffba09`19284ce0 ffffba09`00000000 : dxgkrnl!TdrResetFromTimeoutWorkItem+0x27
ffffb784`850d8b70 fffff804`1d4a2ae5     : ffffba09`30d9e040 00000000`00000080 ffffba09`192a7040 ba07c3b6`b9cba591 : nt!ExpWorkerThread+0x105
ffffb784`850d8c10 fffff804`1d5fbbf8     : ffff9780`eed9c180 ffffba09`30d9e040 fffff804`1d4a2a90 ba98bc2d`ba821b8f : nt!PspSystemThreadStartup+0x55
ffffb784`850d8c60 00000000`00000000     : ffffb784`850d9000 ffffb784`850d3000 00000000`00000000 00000000`00000000 : nt!KiStartSystemThread+0x28


SYMBOL_NAME:  amdkmdag+b2230

MODULE_NAME: amdkmdag

IMAGE_NAME:  amdkmdag.sys

STACK_COMMAND:  .thread ; .cxr ; kb

FAILURE_BUCKET_ID:  0x116_IMAGE_amdkmdag.sys

OS_VERSION:  10.0.19041.1

BUILDLAB_STR:  vb_release

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

FAILURE_ID_HASH:  {1c94a7e8-453f-c7b9-1484-0a0454a0ee36}

Followup:     MachineOwner
---------

Microsoft (R) Windows Debugger Version 10.0.20153.1000 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.


Loading Dump File [C:\Users\CsHay\AppData\Local\Temp\Rar$DIa1672.20527\103120-7484-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available


************* Path validation summary **************
Response                         Time (ms)     Location
Deferred                                       srv*
Symbol search path is: srv*
Executable search path is:
Windows 10 Kernel Version 19041 MP (16 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS
Edition build lab: 19041.1.amd64fre.vb_release.191206-1406
Machine Name:
Kernel base = 0xfffff800`6dc00000 PsLoadedModuleList = 0xfffff800`6e82a310
Debug session time: Sat Oct 31 15:44:32.828 2020 (UTC + 3:00)
System Uptime: 1 days 6:42:07.479
Loading Kernel Symbols
...............................................................
................................................................
................................................................
.............
Loading User Symbols
Loading unloaded module list
..............
For analysis of this file, run !analyze -v
nt!KeBugCheckEx:
fffff800`6dff45a0 48894c2408      mov     qword ptr [rsp+8],rcx ss:0018:ffffe203`f443ea00=0000000000000116
6: kd> !analyze -v
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

VIDEO_TDR_FAILURE (116)
Attempt to reset the display driver and recover from timeout failed.
Arguments:
Arg1: ffffa60567fc5010, Optional pointer to internal TDR recovery context (TDR_RECOVERY_CONTEXT).
Arg2: fffff800826d2230, The pointer into responsible device driver module (e.g. owner tag).
Arg3: ffffffffc0000001, Optional error code (NTSTATUS) of the last failed operation.
Arg4: 0000000000000003, Optional internal context dependent data.

Debugging Details:
------------------

Unable to load image \SystemRoot\System32\DriverStore\FileRepository\u0360073.inf_amd64_4d0a7206a56b4676\B360064\amdkmdag.sys, Win32 error 0n2
*** WARNING: Unable to verify timestamp for amdkmdag.sys
*** WARNING: Unable to verify timestamp for win32k.sys

KEY_VALUES_STRING: 1

    Key  : Analysis.CPU.mSec
    Value: 4734

    Key  : Analysis.DebugAnalysisProvider.CPP
    Value: Create: 8007007e on DESKTOP-IPC9T25

    Key  : Analysis.DebugData
    Value: CreateObject

    Key  : Analysis.DebugModel
    Value: CreateObject

    Key  : Analysis.Elapsed.mSec
    Value: 22521

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 83

    Key  : Analysis.System
    Value: CreateObject

    Key  : WER.OS.Branch
    Value: vb_release

    Key  : WER.OS.Timestamp
    Value: 2019-12-06T14:06:00Z

    Key  : WER.OS.Version
    Value: 10.0.19041.1


ADDITIONAL_XML: 1

OS_BUILD_LAYERS: 1

BUGCHECK_CODE:  116

BUGCHECK_P1: ffffa60567fc5010

BUGCHECK_P2: fffff800826d2230

BUGCHECK_P3: ffffffffc0000001

BUGCHECK_P4: 3

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXPNP: 1 (!blackboxpnp)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  System

STACK_TEXT:
ffffe203`f443e9f8 fffff800`7c3014be     : 00000000`00000116 ffffa605`67fc5010 fffff800`826d2230 ffffffff`c0000001 : nt!KeBugCheckEx
ffffe203`f443ea00 fffff800`7c2a98db     : fffff800`826d2230 ffffa605`5f76b000 ffffa605`5f76b0f0 00000000`00000000 : dxgkrnl!TdrBugcheckOnTimeout+0xfe
ffffe203`f443ea40 fffff800`7c2aa6ae     : ffffa605`00000101 00000000`00002000 ffffa605`5f76b000 00000000`01000000 : dxgkrnl!DXGADAPTER::PrepareToReset+0x1a3
ffffe203`f443ea90 fffff800`7c300be5     : 00000000`00000100 ffffa605`5f76ba58 00000000`00000000 00000000`00000000 : dxgkrnl!DXGADAPTER::Reset+0x28e
ffffe203`f443eb10 fffff800`7c300d57     : fffff800`6e925440 ffffa605`618aeed0 00000000`00000000 00000000`00000700 : dxgkrnl!TdrResetFromTimeout+0x15
ffffe203`f443eb40 fffff800`6df035f5     : ffffa605`6fff9040 fffff800`7c300d30 ffffa605`5249b430 ffffa605`00000000 : dxgkrnl!TdrResetFromTimeoutWorkItem+0x27
ffffe203`f443eb70 fffff800`6dea2ae5     : ffffa605`6fff9040 00000000`00000080 ffffa605`5248f040 3c928000`3c840000 : nt!ExpWorkerThread+0x105
ffffe203`f443ec10 fffff800`6dffbbf8     : fffff800`693ab180 ffffa605`6fff9040 fffff800`6dea2a90 bb8c0000`bbb80000 : nt!PspSystemThreadStartup+0x55
ffffe203`f443ec60 00000000`00000000     : ffffe203`f443f000 ffffe203`f4439000 00000000`00000000 00000000`00000000 : nt!KiStartSystemThread+0x28


SYMBOL_NAME:  amdkmdag+b2230

MODULE_NAME: amdkmdag

IMAGE_NAME:  amdkmdag.sys

STACK_COMMAND:  .thread ; .cxr ; kb

FAILURE_BUCKET_ID:  0x116_IMAGE_amdkmdag.sys

OS_VERSION:  10.0.19041.1

BUILDLAB_STR:  vb_release

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

FAILURE_ID_HASH:  {1c94a7e8-453f-c7b9-1484-0a0454a0ee36}

Followup:     MachineOwner
---------
Bütün söylenenleri yaptım.
DDU ile sürücü kaldırıp güncel sürücüye güncelledim.
Vanguard, Asus yazılımları, Android emülatörlerini kaldırdım.
Herhangi overclock yoktu ama yine de kontrol ettim.
OCCT testlerinin uygulamada bulunan tamamını tavsiye edildiği gibi 5 er dakika yaptım.(3D, Monitör, Power, CPU)
Tamamında "0 hata" bulundu.
Birkaç gün günlük kullanımda devam edeceğim. Hata olursa diye bekleyeceğim. Ama testlerden hiçbir hata oluşmadı.
Başka yapmam gereken birşey var mı?
 
Bütün söylenenleri yaptım.
DDU ile sürücü kaldırıp güncel sürücüye güncelledim.
Vanguard, Asus yazılımları, Android emülatörlerini kaldırdım.
Herhangi overclock yoktu ama yine de kontrol ettim.
OCCT testlerinin uygulamada bulunan tamamını tavsiye edildiği gibi 5 er dakika yaptım.(3D, Monitör, Power, CPU)
Tamamında "0 hata" bulundu.
Birkaç gün günlük kullanımda devam edicem. Hata olursa diye bekleyeceğim. Ama testlerden hiçbir hata oluşmadı.
Başka yapmam gereken birşey var mı?
Belirtilen işlemleri hepsini düzgünce yaptıysan başka bir şey yapmana gerek yok şu anlık. Dediğin gibi bilgisayarı günlük olarak kullan ve mavi ekran alıyor musun almıyor musun gözlemle. Mavi ekran alırsan yeni oluşan minidump dosyasını paylaşırsın, sorun çözüldüyse yani mavi ekran almıyorsan çözüldüğünü belirtirsin.
 
Uyarı! Bu konu 5 yıl önce açıldı.
Muhtemelen daha fazla tartışma gerekli değildir ki bu durumda yeni bir konu başlatmayı öneririz. Eğer yine de cevabınızın gerekli olduğunu düşünüyorsanız buna rağmen cevap verebilirsiniz.

Technopat Haberler

Yeni konular

Geri
Yukarı