DPC_WATCHDOG_VIOLATION (133)
The DPC watchdog detected a prolonged run time at an IRQL of DISPATCH_LEVEL
or above.
Arguments:
Arg1: 0000000000000001, The system cumulatively spent an extended period of time at
DISPATCH_LEVEL or above. The offending component can usually be
identified with a stack trace.
Arg2: 0000000000001e00, The watchdog period.
Arg3: fffff802486fa320, cast to nt!DPC_WATCHDOG_GLOBAL_TRIAGE_BLOCK, which contains
additional information regarding the cumulative timeout
Arg4: 0000000000000000
Debugging Details:
------------------
*************************************************************************
*** ***
*** ***
*** Either you specified an unqualified symbol, or your debugger ***
*** doesn't have full symbol information. Unqualified symbol ***
*** resolution is turned off by default. Please either specify a ***
*** fully qualified symbol module!symbolname, or enable resolution ***
*** of unqualified symbols by typing ".symopt- 100". Note that ***
*** enabling unqualified symbol resolution with network symbol ***
*** server shares in the symbol path may cause the debugger to ***
*** appear to hang for long periods of time when an incorrect ***
*** symbol name is typed or the network symbol server is down. ***
*** ***
*** For some commands to work properly, your symbol path ***
*** must point to .pdb files that have full type information. ***
*** ***
*** Certain .pdb files (such as the public OS symbols) do not ***
*** contain the required information. Contact the group that ***
*** provided you with these symbols if you need this command to ***
*** work. ***
*** ***
*** Type referenced: TickPeriods ***
*** ***
*************************************************************************
*** WARNING: Unable to verify timestamp for win32k.sys
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 6656
Key : Analysis.DebugAnalysisProvider.CPP
Value: Create: 8007007e on BORA
Key : Analysis.DebugData
Value: CreateObject
Key : Analysis.DebugModel
Value: CreateObject
Key : Analysis.Elapsed.mSec
Value: 56298
Key : Analysis.Memory.CommitPeak.Mb
Value: 76
Key : Analysis.System
Value: CreateObject
Key : WER.OS.Branch
Value: vb_release
Key : WER.OS.Timestamp
Value: 2019-12-06T14:06:00Z
Key : WER.OS.Version
Value: 10.0.19041.1
ADDITIONAL_XML: 1
OS_BUILD_LAYERS: 1
BUGCHECK_CODE: 133
BUGCHECK_P1: 1
BUGCHECK_P2: 1e00
BUGCHECK_P3: fffff802486fa320
BUGCHECK_P4: 0
DPC_TIMEOUT_TYPE: DPC_QUEUE_EXECUTION_TIMEOUT_EXCEEDED
TRAP_FRAME: fffff8024c0b7d20 -- (.trap 0xfffff8024c0b7d20)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=00000000000003d6 rbx=0000000000000000 rcx=ffffd400666be000
rdx=ffffc08fd7055000 rsi=0000000000000000 rdi=0000000000000000
rip=fffff80261ef982c rsp=fffff8024c0b7eb0 rbp=ffffc08fd73062f8
r8=ffffc08fd7055000 r9=0000000000000000 r10=0000000000000000
r11=ffffc08fd7070000 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei pl zr na po nc
nvlddmkm+0x7d982c:
fffff802`61ef982c 0f85cf000000 jne nvlddmkm+0x7d9901 (fffff802`61ef9901) [br=0]
Resetting default scope
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXPNP: 1 (!blackboxpnp)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: System
DPC_STACK_BASE: FFFFF8024C0B8FB0
STACK_TEXT:
fffff802`4c0bfc88 fffff802`47e3aa0c : 00000000`00000133 00000000`00000001 00000000`00001e00 fffff802`486fa320 : nt!KeBugCheckEx
fffff802`4c0bfc90 fffff802`47c7541d : 00008600`117e2d2d fffff802`440e1180 00000000`00000246 00000000`005e2864 : nt!KeAccumulateTicks+0x1c880c
fffff802`4c0bfcf0 fffff802`47c759c1 : 00000000`005e2863 00000000`00381f56 fffff802`440e1180 00000000`00000001 : nt!KiUpdateRunTime+0x5d
fffff802`4c0bfd40 fffff802`47c6f833 : fffff802`440e1180 00000000`00000000 fffff802`48631610 00000000`00000000 : nt!KiUpdateTime+0x4a1
fffff802`4c0bfe80 fffff802`47c781f2 : fffff802`4c0b7d20 fffff802`4c0b7da0 fffff802`4c0b7d00 00000000`00000007 : nt!KeClockInterruptNotify+0x2e3
fffff802`4c0bff30 fffff802`47d27ef5 : 000000e0`8028237a fffff802`486f3960 fffff802`486f3a10 ffffd107`333e575f : nt!HalpTimerClockInterrupt+0xe2
fffff802`4c0bff60 fffff802`47df722a : fffff802`4c0b7da0 fffff802`486f3960 ffffc08f`da9b14a0 00000000`00000000 : nt!KiCallInterruptServiceRoutine+0xa5
fffff802`4c0bffb0 fffff802`47df7797 : 00000000`0000000f fffff802`4c0b7d90 fffff802`4c0b8290 fffff802`47d2d740 : nt!KiInterruptSubDispatchNoLockNoEtw+0xfa
fffff802`4c0b7d20 fffff802`61ef982c : 00000000`00000005 fffff802`4c0b7f20 fffff802`4c0b8420 fffff802`47d2d740 : nt!KiInterruptDispatchNoLockNoEtw+0x37
fffff802`4c0b7eb0 00000000`00000005 : fffff802`4c0b7f20 fffff802`4c0b8420 fffff802`47d2d740 00000000`00000000 : nvlddmkm+0x7d982c
fffff802`4c0b7eb8 fffff802`4c0b7f20 : fffff802`4c0b8420 fffff802`47d2d740 00000000`00000000 fffff802`00000001 : 0x5
fffff802`4c0b7ec0 fffff802`4c0b8420 : fffff802`47d2d740 00000000`00000000 fffff802`00000001 fffff802`4c0b86c0 : 0xfffff802`4c0b7f20
fffff802`4c0b7ec8 fffff802`47d2d740 : 00000000`00000000 fffff802`00000001 fffff802`4c0b86c0 fffff802`62103044 : 0xfffff802`4c0b8420
fffff802`4c0b7ed0 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!RtlpWalkFrameChain+0xcd0
SYMBOL_NAME: nvlddmkm+7d982c
MODULE_NAME: nvlddmkm
IMAGE_NAME: nvlddmkm.sys
STACK_COMMAND: .thread ; .cxr ; kb
BUCKET_ID_FUNC_OFFSET: 7d982c
FAILURE_BUCKET_ID: 0x133_ISR_nvlddmkm!unknown_function
OS_VERSION: 10.0.19041.1
BUILDLAB_STR: vb_release
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {f97493a5-ea2b-23ca-a808-8602773c2a86}
Followup: MachineOwner
---------
DPC_WATCHDOG_VIOLATION (133)
The DPC watchdog detected a prolonged run time at an IRQL of DISPATCH_LEVEL
or above.
Arguments:
Arg1: 0000000000000001, The system cumulatively spent an extended period of time at
DISPATCH_LEVEL or above. The offending component can usually be
identified with a stack trace.
Arg2: 0000000000001e00, The watchdog period.
Arg3: fffff801580fa320, cast to nt!DPC_WATCHDOG_GLOBAL_TRIAGE_BLOCK, which contains
additional information regarding the cumulative timeout
Arg4: 0000000000000000
Debugging Details:
------------------
DBGHELP: Timeout to store: https://msdl.microsoft.com/download/symbols
*************************************************************************
*** ***
*** ***
*** Either you specified an unqualified symbol, or your debugger ***
*** doesn't have full symbol information. Unqualified symbol ***
*** resolution is turned off by default. Please either specify a ***
*** fully qualified symbol module!symbolname, or enable resolution ***
*** of unqualified symbols by typing ".symopt- 100". Note that ***
*** enabling unqualified symbol resolution with network symbol ***
*** server shares in the symbol path may cause the debugger to ***
*** appear to hang for long periods of time when an incorrect ***
*** symbol name is typed or the network symbol server is down. ***
*** ***
*** For some commands to work properly, your symbol path ***
*** must point to .pdb files that have full type information. ***
*** ***
*** Certain .pdb files (such as the public OS symbols) do not ***
*** contain the required information. Contact the group that ***
*** provided you with these symbols if you need this command to ***
*** work. ***
*** ***
*** Type referenced: TickPeriods ***
*** ***
*************************************************************************
*** WARNING: Unable to verify timestamp for win32k.sys
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 5624
Key : Analysis.DebugAnalysisProvider.CPP
Value: Create: 8007007e on BORA
Key : Analysis.DebugData
Value: CreateObject
Key : Analysis.DebugModel
Value: CreateObject
Key : Analysis.Elapsed.mSec
Value: 71697
Key : Analysis.Memory.CommitPeak.Mb
Value: 75
Key : Analysis.System
Value: CreateObject
Key : WER.OS.Branch
Value: vb_release
Key : WER.OS.Timestamp
Value: 2019-12-06T14:06:00Z
Key : WER.OS.Version
Value: 10.0.19041.1
ADDITIONAL_XML: 1
OS_BUILD_LAYERS: 1
BUGCHECK_CODE: 133
BUGCHECK_P1: 1
BUGCHECK_P2: 1e00
BUGCHECK_P3: fffff801580fa320
BUGCHECK_P4: 0
DPC_TIMEOUT_TYPE: DPC_QUEUE_EXECUTION_TIMEOUT_EXCEEDED
TRAP_FRAME: fffff8015beaff10 -- (.trap 0xfffff8015beaff10)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000000 rbx=0000000000000000 rcx=0000000000048017
rdx=ffff8a0ec230b000 rsi=0000000000000000 rdi=0000000000000000
rip=fffff801710fbf7d rsp=fffff8015beb00a8 rbp=0000000000000000
r8=ffff8a0ec230c1d8 r9=000000000012005c r10=ffff8a0ebfc20c20
r11=000000000000000e r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei pl nz na po nc
nvlddmkm+0xfbf7d:
fffff801`710fbf7d c3 ret
Resetting default scope
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXPNP: 1 (!blackboxpnp)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: System
STACK_TEXT:
fffff801`5bebfc88 fffff801`5783aa0c : 00000000`00000133 00000000`00000001 00000000`00001e00 fffff801`580fa320 : nt!KeBugCheckEx
fffff801`5bebfc90 fffff801`5767541d : 000013aa`dc83a34c fffff801`53ec7180 00000000`00000246 00000000`00069ace : nt!KeAccumulateTicks+0x1c880c
fffff801`5bebfcf0 fffff801`576759c1 : ffff8a0e`c1136640 00000000`0003efcc fffff801`53ec7180 00000000`00000001 : nt!KiUpdateRunTime+0x5d
fffff801`5bebfd40 fffff801`5766f833 : fffff801`53ec7180 00000000`00000000 fffff801`58031598 00000000`00000000 : nt!KiUpdateTime+0x4a1
fffff801`5bebfe80 fffff801`576781f2 : fffff801`5beaff10 fffff801`5beaff90 fffff801`5beaff00 00000000`00000002 : nt!KeClockInterruptNotify+0x2e3
fffff801`5bebff30 fffff801`57727ef5 : 0000000f`bf484601 fffff801`580f3960 fffff801`580f3a10 ffffb781`f33f6500 : nt!HalpTimerClockInterrupt+0xe2
fffff801`5bebff60 fffff801`577f722a : fffff801`5beaff90 fffff801`580f3960 00000000`0000000e 00000000`00084240 : nt!KiCallInterruptServiceRoutine+0xa5
fffff801`5bebffb0 fffff801`577f7797 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiInterruptSubDispatchNoLockNoEtw+0xfa
fffff801`5beaff10 fffff801`710fbf7d : fffff801`7151995f ffff8a0e`c230b000 00000000`00000000 ffff8a0e`bffde010 : nt!KiInterruptDispatchNoLockNoEtw+0x37
fffff801`5beb00a8 fffff801`7151995f : ffff8a0e`c230b000 00000000`00000000 ffff8a0e`bffde010 00000000`00000002 : nvlddmkm+0xfbf7d
fffff801`5beb00b0 ffff8a0e`c230b000 : 00000000`00000000 ffff8a0e`bffde010 00000000`00000002 00000000`00000020 : nvlddmkm+0x51995f
fffff801`5beb00b8 00000000`00000000 : ffff8a0e`bffde010 00000000`00000002 00000000`00000020 fffff801`5beb00f0 : 0xffff8a0e`c230b000
SYMBOL_NAME: nvlddmkm+fbf7d
MODULE_NAME: nvlddmkm
IMAGE_NAME: nvlddmkm.sys
STACK_COMMAND: .thread ; .cxr ; kb
BUCKET_ID_FUNC_OFFSET: fbf7d
FAILURE_BUCKET_ID: 0x133_ISR_nvlddmkm!unknown_function
OS_VERSION: 10.0.19041.1
BUILDLAB_STR: vb_release
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {f97493a5-ea2b-23ca-a808-8602773c2a86}
Followup: MachineOwner
---------
DPC_WATCHDOG_VIOLATION (133)
The DPC watchdog detected a prolonged run time at an IRQL of DISPATCH_LEVEL
or above.
Arguments:
Arg1: 0000000000000001, The system cumulatively spent an extended period of time at
DISPATCH_LEVEL or above. The offending component can usually be
identified with a stack trace.
Arg2: 0000000000001e00, The watchdog period.
Arg3: fffff800264fa320, cast to nt!DPC_WATCHDOG_GLOBAL_TRIAGE_BLOCK, which contains
additional information regarding the cumulative timeout
Arg4: 0000000000000000
Debugging Details:
------------------
*** WARNING: Unable to verify timestamp for nvlddmkm.sys
*************************************************************************
*** ***
*** ***
*** Either you specified an unqualified symbol, or your debugger ***
*** doesn't have full symbol information. Unqualified symbol ***
*** resolution is turned off by default. Please either specify a ***
*** fully qualified symbol module!symbolname, or enable resolution ***
*** of unqualified symbols by typing ".symopt- 100". Note that ***
*** enabling unqualified symbol resolution with network symbol ***
*** server shares in the symbol path may cause the debugger to ***
*** appear to hang for long periods of time when an incorrect ***
*** symbol name is typed or the network symbol server is down. ***
*** ***
*** For some commands to work properly, your symbol path ***
*** must point to .pdb files that have full type information. ***
*** ***
*** Certain .pdb files (such as the public OS symbols) do not ***
*** contain the required information. Contact the group that ***
*** provided you with these symbols if you need this command to ***
*** work. ***
*** ***
*** Type referenced: TickPeriods ***
*** ***
*************************************************************************
*** WARNING: Unable to verify timestamp for win32k.sys
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 6312
Key : Analysis.DebugAnalysisProvider.CPP
Value: Create: 8007007e on BORA
Key : Analysis.DebugData
Value: CreateObject
Key : Analysis.DebugModel
Value: CreateObject
Key : Analysis.Elapsed.mSec
Value: 85138
Key : Analysis.Memory.CommitPeak.Mb
Value: 76
Key : Analysis.System
Value: CreateObject
Key : WER.OS.Branch
Value: vb_release
Key : WER.OS.Timestamp
Value: 2019-12-06T14:06:00Z
Key : WER.OS.Version
Value: 10.0.19041.1
ADDITIONAL_XML: 1
OS_BUILD_LAYERS: 1
BUGCHECK_CODE: 133
BUGCHECK_P1: 1
BUGCHECK_P2: 1e00
BUGCHECK_P3: fffff800264fa320
BUGCHECK_P4: 0
DPC_TIMEOUT_TYPE: DPC_QUEUE_EXECUTION_TIMEOUT_EXCEEDED
TRAP_FRAME: fffff8002beafb30 -- (.trap 0xfffff8002beafb30)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000004 rbx=0000000000000000 rcx=0000000000000440
rdx=ffffc78dcd314000 rsi=0000000000000000 rdi=0000000000000000
rip=fffff8004180bf7d rsp=fffff8002beafcc8 rbp=0000000000000000
r8=ffffc78dcd3151d8 r9=0000000000001100 r10=ffffc78dcaf51c20
r11=000000000000000e r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei pl nz na pe nc
nvlddmkm+0xfbf7d:
fffff800`4180bf7d c3 ret
Resetting default scope
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: System
STACK_TEXT:
fffff800`2bebfe18 fffff800`25c3aa0c : 00000000`00000133 00000000`00000001 00000000`00001e00 fffff800`264fa320 : nt!KeBugCheckEx
fffff800`2bebfe20 fffff800`25a6f9a3 : 00000737`ec3204c8 fffff800`23e9f180 00000000`00000000 fffff800`23e9f180 : nt!KeAccumulateTicks+0x1c880c
fffff800`2bebfe80 fffff800`25a6f48a : fffff800`264f3840 fffff800`2beafbb0 fffff800`2b287900 00000000`0000a101 : nt!KeClockInterruptNotify+0x453
fffff800`2bebff30 fffff800`25b27ef5 : fffff800`264f3840 fffff800`2bebff40 00000000`00000010 ffffe3c7`2cb636f0 : nt!HalpTimerClockIpiRoutine+0x1a
fffff800`2bebff60 fffff800`25bf722a : fffff800`2beafbb0 fffff800`264f3840 00000000`00000000 00000000`00000000 : nt!KiCallInterruptServiceRoutine+0xa5
fffff800`2bebffb0 fffff800`25bf7797 : 00000000`00000000 00000000`00000000 ffffc78d`00000000 ffff29e6`4e9e505b : nt!KiInterruptSubDispatchNoLockNoEtw+0xfa
fffff800`2beafb30 fffff800`4180bf7d : fffff800`41c340e5 ffffc78d`caf24aa0 00000000`badf1002 00000000`00000000 : nt!KiInterruptDispatchNoLockNoEtw+0x37
fffff800`2beafcc8 fffff800`41c340e5 : ffffc78d`caf24aa0 00000000`badf1002 00000000`00000000 00000000`00000000 : nvlddmkm+0xfbf7d
fffff800`2beafcd0 ffffc78d`caf24aa0 : 00000000`badf1002 00000000`00000000 00000000`00000000 00000000`00000000 : nvlddmkm+0x5240e5
fffff800`2beafcd8 00000000`badf1002 : 00000000`00000000 00000000`00000000 00000000`00000000 fffff800`41c29987 : 0xffffc78d`caf24aa0
fffff800`2beafce0 00000000`00000000 : 00000000`00000000 00000000`00000000 fffff800`41c29987 ffffc78d`cd314000 : 0xbadf1002
SYMBOL_NAME: nvlddmkm+fbf7d
MODULE_NAME: nvlddmkm
IMAGE_NAME: nvlddmkm.sys
STACK_COMMAND: .thread ; .cxr ; kb
BUCKET_ID_FUNC_OFFSET: fbf7d
FAILURE_BUCKET_ID: 0x133_ISR_nvlddmkm!unknown_function
OS_VERSION: 10.0.19041.1
BUILDLAB_STR: vb_release
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {f97493a5-ea2b-23ca-a808-8602773c2a86}
Followup: MachineOwner
---------
DPC_WATCHDOG_VIOLATION (133)
The DPC watchdog detected a prolonged run time at an IRQL of DISPATCH_LEVEL
or above.
Arguments:
Arg1: 0000000000000001, The system cumulatively spent an extended period of time at
DISPATCH_LEVEL or above. The offending component can usually be
identified with a stack trace.
Arg2: 0000000000001e00, The watchdog period.
Arg3: fffff802486fa320, cast to nt!DPC_WATCHDOG_GLOBAL_TRIAGE_BLOCK, which contains
additional information regarding the cumulative timeout
Arg4: 0000000000000000
Debugging Details:
------------------
*************************************************************************
*** ***
*** ***
*** Either you specified an unqualified symbol, or your debugger ***
*** doesn't have full symbol information. Unqualified symbol ***
*** resolution is turned off by default. Please either specify a ***
*** fully qualified symbol module!symbolname, or enable resolution ***
*** of unqualified symbols by typing ".symopt- 100". Note that ***
*** enabling unqualified symbol resolution with network symbol ***
*** server shares in the symbol path may cause the debugger to ***
*** appear to hang for long periods of time when an incorrect ***
*** symbol name is typed or the network symbol server is down. ***
*** ***
*** For some commands to work properly, your symbol path ***
*** must point to .pdb files that have full type information. ***
*** ***
*** Certain .pdb files (such as the public OS symbols) do not ***
*** contain the required information. Contact the group that ***
*** provided you with these symbols if you need this command to ***
*** work. ***
*** ***
*** Type referenced: TickPeriods ***
*** ***
*************************************************************************
*** WARNING: Unable to verify timestamp for win32k.sys
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 6656
Key : Analysis.DebugAnalysisProvider.CPP
Value: Create: 8007007e on BORA
Key : Analysis.DebugData
Value: CreateObject
Key : Analysis.DebugModel
Value: CreateObject
Key : Analysis.Elapsed.mSec
Value: 56298
Key : Analysis.Memory.CommitPeak.Mb
Value: 76
Key : Analysis.System
Value: CreateObject
Key : WER.OS.Branch
Value: vb_release
Key : WER.OS.Timestamp
Value: 2019-12-06T14:06:00Z
Key : WER.OS.Version
Value: 10.0.19041.1
ADDITIONAL_XML: 1
OS_BUILD_LAYERS: 1
BUGCHECK_CODE: 133
BUGCHECK_P1: 1
BUGCHECK_P2: 1e00
BUGCHECK_P3: fffff802486fa320
BUGCHECK_P4: 0
DPC_TIMEOUT_TYPE: DPC_QUEUE_EXECUTION_TIMEOUT_EXCEEDED
TRAP_FRAME: fffff8024c0b7d20 -- (.trap 0xfffff8024c0b7d20)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=00000000000003d6 rbx=0000000000000000 rcx=ffffd400666be000
rdx=ffffc08fd7055000 rsi=0000000000000000 rdi=0000000000000000
rip=fffff80261ef982c rsp=fffff8024c0b7eb0 rbp=ffffc08fd73062f8
r8=ffffc08fd7055000 r9=0000000000000000 r10=0000000000000000
r11=ffffc08fd7070000 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei pl zr na po nc
nvlddmkm+0x7d982c:
fffff802`61ef982c 0f85cf000000 jne nvlddmkm+0x7d9901 (fffff802`61ef9901) [br=0]
Resetting default scope
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXPNP: 1 (!blackboxpnp)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: System
DPC_STACK_BASE: FFFFF8024C0B8FB0
STACK_TEXT:
fffff802`4c0bfc88 fffff802`47e3aa0c : 00000000`00000133 00000000`00000001 00000000`00001e00 fffff802`486fa320 : nt!KeBugCheckEx
fffff802`4c0bfc90 fffff802`47c7541d : 00008600`117e2d2d fffff802`440e1180 00000000`00000246 00000000`005e2864 : nt!KeAccumulateTicks+0x1c880c
fffff802`4c0bfcf0 fffff802`47c759c1 : 00000000`005e2863 00000000`00381f56 fffff802`440e1180 00000000`00000001 : nt!KiUpdateRunTime+0x5d
fffff802`4c0bfd40 fffff802`47c6f833 : fffff802`440e1180 00000000`00000000 fffff802`48631610 00000000`00000000 : nt!KiUpdateTime+0x4a1
fffff802`4c0bfe80 fffff802`47c781f2 : fffff802`4c0b7d20 fffff802`4c0b7da0 fffff802`4c0b7d00 00000000`00000007 : nt!KeClockInterruptNotify+0x2e3
fffff802`4c0bff30 fffff802`47d27ef5 : 000000e0`8028237a fffff802`486f3960 fffff802`486f3a10 ffffd107`333e575f : nt!HalpTimerClockInterrupt+0xe2
fffff802`4c0bff60 fffff802`47df722a : fffff802`4c0b7da0 fffff802`486f3960 ffffc08f`da9b14a0 00000000`00000000 : nt!KiCallInterruptServiceRoutine+0xa5
fffff802`4c0bffb0 fffff802`47df7797 : 00000000`0000000f fffff802`4c0b7d90 fffff802`4c0b8290 fffff802`47d2d740 : nt!KiInterruptSubDispatchNoLockNoEtw+0xfa
fffff802`4c0b7d20 fffff802`61ef982c : 00000000`00000005 fffff802`4c0b7f20 fffff802`4c0b8420 fffff802`47d2d740 : nt!KiInterruptDispatchNoLockNoEtw+0x37
fffff802`4c0b7eb0 00000000`00000005 : fffff802`4c0b7f20 fffff802`4c0b8420 fffff802`47d2d740 00000000`00000000 : nvlddmkm+0x7d982c
fffff802`4c0b7eb8 fffff802`4c0b7f20 : fffff802`4c0b8420 fffff802`47d2d740 00000000`00000000 fffff802`00000001 : 0x5
fffff802`4c0b7ec0 fffff802`4c0b8420 : fffff802`47d2d740 00000000`00000000 fffff802`00000001 fffff802`4c0b86c0 : 0xfffff802`4c0b7f20
fffff802`4c0b7ec8 fffff802`47d2d740 : 00000000`00000000 fffff802`00000001 fffff802`4c0b86c0 fffff802`62103044 : 0xfffff802`4c0b8420
fffff802`4c0b7ed0 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!RtlpWalkFrameChain+0xcd0
SYMBOL_NAME: nvlddmkm+7d982c
MODULE_NAME: nvlddmkm
IMAGE_NAME: nvlddmkm.sys
STACK_COMMAND: .thread ; .cxr ; kb
BUCKET_ID_FUNC_OFFSET: 7d982c
FAILURE_BUCKET_ID: 0x133_ISR_nvlddmkm!unknown_function
OS_VERSION: 10.0.19041.1
BUILDLAB_STR: vb_release
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {f97493a5-ea2b-23ca-a808-8602773c2a86}
Followup: MachineOwner
---------
DPC_WATCHDOG_VIOLATION (133)
The DPC watchdog detected a prolonged run time at an IRQL of DISPATCH_LEVEL
or above.
Arguments:
Arg1: 0000000000000001, The system cumulatively spent an extended period of time at
DISPATCH_LEVEL or above. The offending component can usually be
identified with a stack trace.
Arg2: 0000000000001e00, The watchdog period.
Arg3: fffff801580fa320, cast to nt!DPC_WATCHDOG_GLOBAL_TRIAGE_BLOCK, which contains
additional information regarding the cumulative timeout
Arg4: 0000000000000000
Debugging Details:
------------------
DBGHELP: Timeout to store: https://msdl.microsoft.com/download/symbols
*************************************************************************
*** ***
*** ***
*** Either you specified an unqualified symbol, or your debugger ***
*** doesn't have full symbol information. Unqualified symbol ***
*** resolution is turned off by default. Please either specify a ***
*** fully qualified symbol module!symbolname, or enable resolution ***
*** of unqualified symbols by typing ".symopt- 100". Note that ***
*** enabling unqualified symbol resolution with network symbol ***
*** server shares in the symbol path may cause the debugger to ***
*** appear to hang for long periods of time when an incorrect ***
*** symbol name is typed or the network symbol server is down. ***
*** ***
*** For some commands to work properly, your symbol path ***
*** must point to .pdb files that have full type information. ***
*** ***
*** Certain .pdb files (such as the public OS symbols) do not ***
*** contain the required information. Contact the group that ***
*** provided you with these symbols if you need this command to ***
*** work. ***
*** ***
*** Type referenced: TickPeriods ***
*** ***
*************************************************************************
*** WARNING: Unable to verify timestamp for win32k.sys
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 5624
Key : Analysis.DebugAnalysisProvider.CPP
Value: Create: 8007007e on BORA
Key : Analysis.DebugData
Value: CreateObject
Key : Analysis.DebugModel
Value: CreateObject
Key : Analysis.Elapsed.mSec
Value: 71697
Key : Analysis.Memory.CommitPeak.Mb
Value: 75
Key : Analysis.System
Value: CreateObject
Key : WER.OS.Branch
Value: vb_release
Key : WER.OS.Timestamp
Value: 2019-12-06T14:06:00Z
Key : WER.OS.Version
Value: 10.0.19041.1
ADDITIONAL_XML: 1
OS_BUILD_LAYERS: 1
BUGCHECK_CODE: 133
BUGCHECK_P1: 1
BUGCHECK_P2: 1e00
BUGCHECK_P3: fffff801580fa320
BUGCHECK_P4: 0
DPC_TIMEOUT_TYPE: DPC_QUEUE_EXECUTION_TIMEOUT_EXCEEDED
TRAP_FRAME: fffff8015beaff10 -- (.trap 0xfffff8015beaff10)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000000 rbx=0000000000000000 rcx=0000000000048017
rdx=ffff8a0ec230b000 rsi=0000000000000000 rdi=0000000000000000
rip=fffff801710fbf7d rsp=fffff8015beb00a8 rbp=0000000000000000
r8=ffff8a0ec230c1d8 r9=000000000012005c r10=ffff8a0ebfc20c20
r11=000000000000000e r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei pl nz na po nc
nvlddmkm+0xfbf7d:
fffff801`710fbf7d c3 ret
Resetting default scope
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXPNP: 1 (!blackboxpnp)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: System
STACK_TEXT:
fffff801`5bebfc88 fffff801`5783aa0c : 00000000`00000133 00000000`00000001 00000000`00001e00 fffff801`580fa320 : nt!KeBugCheckEx
fffff801`5bebfc90 fffff801`5767541d : 000013aa`dc83a34c fffff801`53ec7180 00000000`00000246 00000000`00069ace : nt!KeAccumulateTicks+0x1c880c
fffff801`5bebfcf0 fffff801`576759c1 : ffff8a0e`c1136640 00000000`0003efcc fffff801`53ec7180 00000000`00000001 : nt!KiUpdateRunTime+0x5d
fffff801`5bebfd40 fffff801`5766f833 : fffff801`53ec7180 00000000`00000000 fffff801`58031598 00000000`00000000 : nt!KiUpdateTime+0x4a1
fffff801`5bebfe80 fffff801`576781f2 : fffff801`5beaff10 fffff801`5beaff90 fffff801`5beaff00 00000000`00000002 : nt!KeClockInterruptNotify+0x2e3
fffff801`5bebff30 fffff801`57727ef5 : 0000000f`bf484601 fffff801`580f3960 fffff801`580f3a10 ffffb781`f33f6500 : nt!HalpTimerClockInterrupt+0xe2
fffff801`5bebff60 fffff801`577f722a : fffff801`5beaff90 fffff801`580f3960 00000000`0000000e 00000000`00084240 : nt!KiCallInterruptServiceRoutine+0xa5
fffff801`5bebffb0 fffff801`577f7797 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiInterruptSubDispatchNoLockNoEtw+0xfa
fffff801`5beaff10 fffff801`710fbf7d : fffff801`7151995f ffff8a0e`c230b000 00000000`00000000 ffff8a0e`bffde010 : nt!KiInterruptDispatchNoLockNoEtw+0x37
fffff801`5beb00a8 fffff801`7151995f : ffff8a0e`c230b000 00000000`00000000 ffff8a0e`bffde010 00000000`00000002 : nvlddmkm+0xfbf7d
fffff801`5beb00b0 ffff8a0e`c230b000 : 00000000`00000000 ffff8a0e`bffde010 00000000`00000002 00000000`00000020 : nvlddmkm+0x51995f
fffff801`5beb00b8 00000000`00000000 : ffff8a0e`bffde010 00000000`00000002 00000000`00000020 fffff801`5beb00f0 : 0xffff8a0e`c230b000
SYMBOL_NAME: nvlddmkm+fbf7d
MODULE_NAME: nvlddmkm
IMAGE_NAME: nvlddmkm.sys
STACK_COMMAND: .thread ; .cxr ; kb
BUCKET_ID_FUNC_OFFSET: fbf7d
FAILURE_BUCKET_ID: 0x133_ISR_nvlddmkm!unknown_function
OS_VERSION: 10.0.19041.1
BUILDLAB_STR: vb_release
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {f97493a5-ea2b-23ca-a808-8602773c2a86}
Followup: MachineOwner
---------
DPC_WATCHDOG_VIOLATION (133)
The DPC watchdog detected a prolonged run time at an IRQL of DISPATCH_LEVEL
or above.
Arguments:
Arg1: 0000000000000001, The system cumulatively spent an extended period of time at
DISPATCH_LEVEL or above. The offending component can usually be
identified with a stack trace.
Arg2: 0000000000001e00, The watchdog period.
Arg3: fffff800264fa320, cast to nt!DPC_WATCHDOG_GLOBAL_TRIAGE_BLOCK, which contains
additional information regarding the cumulative timeout
Arg4: 0000000000000000
Debugging Details:
------------------
*** WARNING: Unable to verify timestamp for nvlddmkm.sys
*************************************************************************
*** ***
*** ***
*** Either you specified an unqualified symbol, or your debugger ***
*** doesn't have full symbol information. Unqualified symbol ***
*** resolution is turned off by default. Please either specify a ***
*** fully qualified symbol module!symbolname, or enable resolution ***
*** of unqualified symbols by typing ".symopt- 100". Note that ***
*** enabling unqualified symbol resolution with network symbol ***
*** server shares in the symbol path may cause the debugger to ***
*** appear to hang for long periods of time when an incorrect ***
*** symbol name is typed or the network symbol server is down. ***
*** ***
*** For some commands to work properly, your symbol path ***
*** must point to .pdb files that have full type information. ***
*** ***
*** Certain .pdb files (such as the public OS symbols) do not ***
*** contain the required information. Contact the group that ***
*** provided you with these symbols if you need this command to ***
*** work. ***
*** ***
*** Type referenced: TickPeriods ***
*** ***
*************************************************************************
*** WARNING: Unable to verify timestamp for win32k.sys
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 6312
Key : Analysis.DebugAnalysisProvider.CPP
Value: Create: 8007007e on BORA
Key : Analysis.DebugData
Value: CreateObject
Key : Analysis.DebugModel
Value: CreateObject
Key : Analysis.Elapsed.mSec
Value: 85138
Key : Analysis.Memory.CommitPeak.Mb
Value: 76
Key : Analysis.System
Value: CreateObject
Key : WER.OS.Branch
Value: vb_release
Key : WER.OS.Timestamp
Value: 2019-12-06T14:06:00Z
Key : WER.OS.Version
Value: 10.0.19041.1
ADDITIONAL_XML: 1
OS_BUILD_LAYERS: 1
BUGCHECK_CODE: 133
BUGCHECK_P1: 1
BUGCHECK_P2: 1e00
BUGCHECK_P3: fffff800264fa320
BUGCHECK_P4: 0
DPC_TIMEOUT_TYPE: DPC_QUEUE_EXECUTION_TIMEOUT_EXCEEDED
TRAP_FRAME: fffff8002beafb30 -- (.trap 0xfffff8002beafb30)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000004 rbx=0000000000000000 rcx=0000000000000440
rdx=ffffc78dcd314000 rsi=0000000000000000 rdi=0000000000000000
rip=fffff8004180bf7d rsp=fffff8002beafcc8 rbp=0000000000000000
r8=ffffc78dcd3151d8 r9=0000000000001100 r10=ffffc78dcaf51c20
r11=000000000000000e r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei pl nz na pe nc
nvlddmkm+0xfbf7d:
fffff800`4180bf7d c3 ret
Resetting default scope
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: System
STACK_TEXT:
fffff800`2bebfe18 fffff800`25c3aa0c : 00000000`00000133 00000000`00000001 00000000`00001e00 fffff800`264fa320 : nt!KeBugCheckEx
fffff800`2bebfe20 fffff800`25a6f9a3 : 00000737`ec3204c8 fffff800`23e9f180 00000000`00000000 fffff800`23e9f180 : nt!KeAccumulateTicks+0x1c880c
fffff800`2bebfe80 fffff800`25a6f48a : fffff800`264f3840 fffff800`2beafbb0 fffff800`2b287900 00000000`0000a101 : nt!KeClockInterruptNotify+0x453
fffff800`2bebff30 fffff800`25b27ef5 : fffff800`264f3840 fffff800`2bebff40 00000000`00000010 ffffe3c7`2cb636f0 : nt!HalpTimerClockIpiRoutine+0x1a
fffff800`2bebff60 fffff800`25bf722a : fffff800`2beafbb0 fffff800`264f3840 00000000`00000000 00000000`00000000 : nt!KiCallInterruptServiceRoutine+0xa5
fffff800`2bebffb0 fffff800`25bf7797 : 00000000`00000000 00000000`00000000 ffffc78d`00000000 ffff29e6`4e9e505b : nt!KiInterruptSubDispatchNoLockNoEtw+0xfa
fffff800`2beafb30 fffff800`4180bf7d : fffff800`41c340e5 ffffc78d`caf24aa0 00000000`badf1002 00000000`00000000 : nt!KiInterruptDispatchNoLockNoEtw+0x37
fffff800`2beafcc8 fffff800`41c340e5 : ffffc78d`caf24aa0 00000000`badf1002 00000000`00000000 00000000`00000000 : nvlddmkm+0xfbf7d
fffff800`2beafcd0 ffffc78d`caf24aa0 : 00000000`badf1002 00000000`00000000 00000000`00000000 00000000`00000000 : nvlddmkm+0x5240e5
fffff800`2beafcd8 00000000`badf1002 : 00000000`00000000 00000000`00000000 00000000`00000000 fffff800`41c29987 : 0xffffc78d`caf24aa0
fffff800`2beafce0 00000000`00000000 : 00000000`00000000 00000000`00000000 fffff800`41c29987 ffffc78d`cd314000 : 0xbadf1002
SYMBOL_NAME: nvlddmkm+fbf7d
MODULE_NAME: nvlddmkm
IMAGE_NAME: nvlddmkm.sys
STACK_COMMAND: .thread ; .cxr ; kb
BUCKET_ID_FUNC_OFFSET: fbf7d
FAILURE_BUCKET_ID: 0x133_ISR_nvlddmkm!unknown_function
OS_VERSION: 10.0.19041.1
BUILDLAB_STR: vb_release
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {f97493a5-ea2b-23ca-a808-8602773c2a86}
Followup: MachineOwner
---------
dediklerinizi uyguladım. şu ana kadar mavi ekran hatası almadım teşekkür ederim.Ekran kartında görünüyor. Format sonrası almanız bana sorunun donanımsal değil, yazılımsal olduğunu düşündürüyor. Ekran kartınızın sürücüsünü DDU ile kaldırıp sitesinden güncelleyin. Sürücü bulucu kullanıyor musunuz?
Rehber: DDU ile Sürücü Kaldırma Rehberi
Display Driver Uninstaller (DDU), zamanla bilgisayara takılan farklı monitörler, üst üste güncellenen sürücüler ve Windows güncellemeleri sonrası biriken kayıt defteri ve sürücü dosyalarını silerek temiz bir sürücü kurulumunun yolunu açan kullanışlı bir araçtır. Adım adım sürücü temizliği...www.technopat.net
Ayrıca Malwarebytes'ı kaldırın, Windows'u son sürüme güncelleyin.
Kod:DPC_WATCHDOG_VIOLATION (133) The DPC watchdog detected a prolonged run time at an IRQL of DISPATCH_LEVEL or above. Arguments: Arg1: 0000000000000001, The system cumulatively spent an extended period of time at DISPATCH_LEVEL or above. The offending component can usually be identified with a stack trace. Arg2: 0000000000001e00, The watchdog period. Arg3: fffff802486fa320, cast to nt!DPC_WATCHDOG_GLOBAL_TRIAGE_BLOCK, which contains additional information regarding the cumulative timeout Arg4: 0000000000000000 Debugging Details: ------------------ ************************************************************************* *** *** *** *** *** Either you specified an unqualified symbol, or your debugger *** *** doesn't have full symbol information. Unqualified symbol *** *** resolution is turned off by default. Please either specify a *** *** fully qualified symbol module!symbolname, or enable resolution *** *** of unqualified symbols by typing ".symopt- 100". Note that *** *** enabling unqualified symbol resolution with network symbol *** *** server shares in the symbol path may cause the debugger to *** *** appear to hang for long periods of time when an incorrect *** *** symbol name is typed or the network symbol server is down. *** *** *** *** For some commands to work properly, your symbol path *** *** must point to .pdb files that have full type information. *** *** *** *** Certain .pdb files (such as the public OS symbols) do not *** *** contain the required information. Contact the group that *** *** provided you with these symbols if you need this command to *** *** work. *** *** *** *** Type referenced: TickPeriods *** *** *** ************************************************************************* *** WARNING: Unable to verify timestamp for win32k.sys KEY_VALUES_STRING: 1 Key : Analysis.CPU.mSec Value: 6656 Key : Analysis.DebugAnalysisProvider.CPP Value: Create: 8007007e on BORA Key : Analysis.DebugData Value: CreateObject Key : Analysis.DebugModel Value: CreateObject Key : Analysis.Elapsed.mSec Value: 56298 Key : Analysis.Memory.CommitPeak.Mb Value: 76 Key : Analysis.System Value: CreateObject Key : WER.OS.Branch Value: vb_release Key : WER.OS.Timestamp Value: 2019-12-06T14:06:00Z Key : WER.OS.Version Value: 10.0.19041.1 ADDITIONAL_XML: 1 OS_BUILD_LAYERS: 1 BUGCHECK_CODE: 133 BUGCHECK_P1: 1 BUGCHECK_P2: 1e00 BUGCHECK_P3: fffff802486fa320 BUGCHECK_P4: 0 DPC_TIMEOUT_TYPE: DPC_QUEUE_EXECUTION_TIMEOUT_EXCEEDED TRAP_FRAME: fffff8024c0b7d20 -- (.trap 0xfffff8024c0b7d20) NOTE: The trap frame does not contain all registers. Some register values may be zeroed or incorrect. rax=00000000000003d6 rbx=0000000000000000 rcx=ffffd400666be000 rdx=ffffc08fd7055000 rsi=0000000000000000 rdi=0000000000000000 rip=fffff80261ef982c rsp=fffff8024c0b7eb0 rbp=ffffc08fd73062f8 r8=ffffc08fd7055000 r9=0000000000000000 r10=0000000000000000 r11=ffffc08fd7070000 r12=0000000000000000 r13=0000000000000000 r14=0000000000000000 r15=0000000000000000 iopl=0 nv up ei pl zr na po nc nvlddmkm+0x7d982c: fffff802`61ef982c 0f85cf000000 jne nvlddmkm+0x7d9901 (fffff802`61ef9901) [br=0] Resetting default scope BLACKBOXBSD: 1 (!blackboxbsd) BLACKBOXNTFS: 1 (!blackboxntfs) BLACKBOXPNP: 1 (!blackboxpnp) BLACKBOXWINLOGON: 1 CUSTOMER_CRASH_COUNT: 1 PROCESS_NAME: System DPC_STACK_BASE: FFFFF8024C0B8FB0 STACK_TEXT: fffff802`4c0bfc88 fffff802`47e3aa0c : 00000000`00000133 00000000`00000001 00000000`00001e00 fffff802`486fa320 : nt!KeBugCheckEx fffff802`4c0bfc90 fffff802`47c7541d : 00008600`117e2d2d fffff802`440e1180 00000000`00000246 00000000`005e2864 : nt!KeAccumulateTicks+0x1c880c fffff802`4c0bfcf0 fffff802`47c759c1 : 00000000`005e2863 00000000`00381f56 fffff802`440e1180 00000000`00000001 : nt!KiUpdateRunTime+0x5d fffff802`4c0bfd40 fffff802`47c6f833 : fffff802`440e1180 00000000`00000000 fffff802`48631610 00000000`00000000 : nt!KiUpdateTime+0x4a1 fffff802`4c0bfe80 fffff802`47c781f2 : fffff802`4c0b7d20 fffff802`4c0b7da0 fffff802`4c0b7d00 00000000`00000007 : nt!KeClockInterruptNotify+0x2e3 fffff802`4c0bff30 fffff802`47d27ef5 : 000000e0`8028237a fffff802`486f3960 fffff802`486f3a10 ffffd107`333e575f : nt!HalpTimerClockInterrupt+0xe2 fffff802`4c0bff60 fffff802`47df722a : fffff802`4c0b7da0 fffff802`486f3960 ffffc08f`da9b14a0 00000000`00000000 : nt!KiCallInterruptServiceRoutine+0xa5 fffff802`4c0bffb0 fffff802`47df7797 : 00000000`0000000f fffff802`4c0b7d90 fffff802`4c0b8290 fffff802`47d2d740 : nt!KiInterruptSubDispatchNoLockNoEtw+0xfa fffff802`4c0b7d20 fffff802`61ef982c : 00000000`00000005 fffff802`4c0b7f20 fffff802`4c0b8420 fffff802`47d2d740 : nt!KiInterruptDispatchNoLockNoEtw+0x37 fffff802`4c0b7eb0 00000000`00000005 : fffff802`4c0b7f20 fffff802`4c0b8420 fffff802`47d2d740 00000000`00000000 : nvlddmkm+0x7d982c fffff802`4c0b7eb8 fffff802`4c0b7f20 : fffff802`4c0b8420 fffff802`47d2d740 00000000`00000000 fffff802`00000001 : 0x5 fffff802`4c0b7ec0 fffff802`4c0b8420 : fffff802`47d2d740 00000000`00000000 fffff802`00000001 fffff802`4c0b86c0 : 0xfffff802`4c0b7f20 fffff802`4c0b7ec8 fffff802`47d2d740 : 00000000`00000000 fffff802`00000001 fffff802`4c0b86c0 fffff802`62103044 : 0xfffff802`4c0b8420 fffff802`4c0b7ed0 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!RtlpWalkFrameChain+0xcd0 SYMBOL_NAME: nvlddmkm+7d982c MODULE_NAME: nvlddmkm IMAGE_NAME: nvlddmkm.sys STACK_COMMAND: .thread ; .cxr ; kb BUCKET_ID_FUNC_OFFSET: 7d982c FAILURE_BUCKET_ID: 0x133_ISR_nvlddmkm!unknown_function OS_VERSION: 10.0.19041.1 BUILDLAB_STR: vb_release OSPLATFORM_TYPE: x64 OSNAME: Windows 10 FAILURE_ID_HASH: {f97493a5-ea2b-23ca-a808-8602773c2a86} Followup: MachineOwner --------- DPC_WATCHDOG_VIOLATION (133) The DPC watchdog detected a prolonged run time at an IRQL of DISPATCH_LEVEL or above. Arguments: Arg1: 0000000000000001, The system cumulatively spent an extended period of time at DISPATCH_LEVEL or above. The offending component can usually be identified with a stack trace. Arg2: 0000000000001e00, The watchdog period. Arg3: fffff801580fa320, cast to nt!DPC_WATCHDOG_GLOBAL_TRIAGE_BLOCK, which contains additional information regarding the cumulative timeout Arg4: 0000000000000000 Debugging Details: ------------------ DBGHELP: Timeout to store: https://msdl.microsoft.com/download/symbols ************************************************************************* *** *** *** *** *** Either you specified an unqualified symbol, or your debugger *** *** doesn't have full symbol information. Unqualified symbol *** *** resolution is turned off by default. Please either specify a *** *** fully qualified symbol module!symbolname, or enable resolution *** *** of unqualified symbols by typing ".symopt- 100". Note that *** *** enabling unqualified symbol resolution with network symbol *** *** server shares in the symbol path may cause the debugger to *** *** appear to hang for long periods of time when an incorrect *** *** symbol name is typed or the network symbol server is down. *** *** *** *** For some commands to work properly, your symbol path *** *** must point to .pdb files that have full type information. *** *** *** *** Certain .pdb files (such as the public OS symbols) do not *** *** contain the required information. Contact the group that *** *** provided you with these symbols if you need this command to *** *** work. *** *** *** *** Type referenced: TickPeriods *** *** *** ************************************************************************* *** WARNING: Unable to verify timestamp for win32k.sys KEY_VALUES_STRING: 1 Key : Analysis.CPU.mSec Value: 5624 Key : Analysis.DebugAnalysisProvider.CPP Value: Create: 8007007e on BORA Key : Analysis.DebugData Value: CreateObject Key : Analysis.DebugModel Value: CreateObject Key : Analysis.Elapsed.mSec Value: 71697 Key : Analysis.Memory.CommitPeak.Mb Value: 75 Key : Analysis.System Value: CreateObject Key : WER.OS.Branch Value: vb_release Key : WER.OS.Timestamp Value: 2019-12-06T14:06:00Z Key : WER.OS.Version Value: 10.0.19041.1 ADDITIONAL_XML: 1 OS_BUILD_LAYERS: 1 BUGCHECK_CODE: 133 BUGCHECK_P1: 1 BUGCHECK_P2: 1e00 BUGCHECK_P3: fffff801580fa320 BUGCHECK_P4: 0 DPC_TIMEOUT_TYPE: DPC_QUEUE_EXECUTION_TIMEOUT_EXCEEDED TRAP_FRAME: fffff8015beaff10 -- (.trap 0xfffff8015beaff10) NOTE: The trap frame does not contain all registers. Some register values may be zeroed or incorrect. rax=0000000000000000 rbx=0000000000000000 rcx=0000000000048017 rdx=ffff8a0ec230b000 rsi=0000000000000000 rdi=0000000000000000 rip=fffff801710fbf7d rsp=fffff8015beb00a8 rbp=0000000000000000 r8=ffff8a0ec230c1d8 r9=000000000012005c r10=ffff8a0ebfc20c20 r11=000000000000000e r12=0000000000000000 r13=0000000000000000 r14=0000000000000000 r15=0000000000000000 iopl=0 nv up ei pl nz na po nc nvlddmkm+0xfbf7d: fffff801`710fbf7d c3 ret Resetting default scope BLACKBOXBSD: 1 (!blackboxbsd) BLACKBOXNTFS: 1 (!blackboxntfs) BLACKBOXPNP: 1 (!blackboxpnp) BLACKBOXWINLOGON: 1 CUSTOMER_CRASH_COUNT: 1 PROCESS_NAME: System STACK_TEXT: fffff801`5bebfc88 fffff801`5783aa0c : 00000000`00000133 00000000`00000001 00000000`00001e00 fffff801`580fa320 : nt!KeBugCheckEx fffff801`5bebfc90 fffff801`5767541d : 000013aa`dc83a34c fffff801`53ec7180 00000000`00000246 00000000`00069ace : nt!KeAccumulateTicks+0x1c880c fffff801`5bebfcf0 fffff801`576759c1 : ffff8a0e`c1136640 00000000`0003efcc fffff801`53ec7180 00000000`00000001 : nt!KiUpdateRunTime+0x5d fffff801`5bebfd40 fffff801`5766f833 : fffff801`53ec7180 00000000`00000000 fffff801`58031598 00000000`00000000 : nt!KiUpdateTime+0x4a1 fffff801`5bebfe80 fffff801`576781f2 : fffff801`5beaff10 fffff801`5beaff90 fffff801`5beaff00 00000000`00000002 : nt!KeClockInterruptNotify+0x2e3 fffff801`5bebff30 fffff801`57727ef5 : 0000000f`bf484601 fffff801`580f3960 fffff801`580f3a10 ffffb781`f33f6500 : nt!HalpTimerClockInterrupt+0xe2 fffff801`5bebff60 fffff801`577f722a : fffff801`5beaff90 fffff801`580f3960 00000000`0000000e 00000000`00084240 : nt!KiCallInterruptServiceRoutine+0xa5 fffff801`5bebffb0 fffff801`577f7797 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiInterruptSubDispatchNoLockNoEtw+0xfa fffff801`5beaff10 fffff801`710fbf7d : fffff801`7151995f ffff8a0e`c230b000 00000000`00000000 ffff8a0e`bffde010 : nt!KiInterruptDispatchNoLockNoEtw+0x37 fffff801`5beb00a8 fffff801`7151995f : ffff8a0e`c230b000 00000000`00000000 ffff8a0e`bffde010 00000000`00000002 : nvlddmkm+0xfbf7d fffff801`5beb00b0 ffff8a0e`c230b000 : 00000000`00000000 ffff8a0e`bffde010 00000000`00000002 00000000`00000020 : nvlddmkm+0x51995f fffff801`5beb00b8 00000000`00000000 : ffff8a0e`bffde010 00000000`00000002 00000000`00000020 fffff801`5beb00f0 : 0xffff8a0e`c230b000 SYMBOL_NAME: nvlddmkm+fbf7d MODULE_NAME: nvlddmkm IMAGE_NAME: nvlddmkm.sys STACK_COMMAND: .thread ; .cxr ; kb BUCKET_ID_FUNC_OFFSET: fbf7d FAILURE_BUCKET_ID: 0x133_ISR_nvlddmkm!unknown_function OS_VERSION: 10.0.19041.1 BUILDLAB_STR: vb_release OSPLATFORM_TYPE: x64 OSNAME: Windows 10 FAILURE_ID_HASH: {f97493a5-ea2b-23ca-a808-8602773c2a86} Followup: MachineOwner --------- DPC_WATCHDOG_VIOLATION (133) The DPC watchdog detected a prolonged run time at an IRQL of DISPATCH_LEVEL or above. Arguments: Arg1: 0000000000000001, The system cumulatively spent an extended period of time at DISPATCH_LEVEL or above. The offending component can usually be identified with a stack trace. Arg2: 0000000000001e00, The watchdog period. Arg3: fffff800264fa320, cast to nt!DPC_WATCHDOG_GLOBAL_TRIAGE_BLOCK, which contains additional information regarding the cumulative timeout Arg4: 0000000000000000 Debugging Details: ------------------ *** WARNING: Unable to verify timestamp for nvlddmkm.sys ************************************************************************* *** *** *** *** *** Either you specified an unqualified symbol, or your debugger *** *** doesn't have full symbol information. Unqualified symbol *** *** resolution is turned off by default. Please either specify a *** *** fully qualified symbol module!symbolname, or enable resolution *** *** of unqualified symbols by typing ".symopt- 100". Note that *** *** enabling unqualified symbol resolution with network symbol *** *** server shares in the symbol path may cause the debugger to *** *** appear to hang for long periods of time when an incorrect *** *** symbol name is typed or the network symbol server is down. *** *** *** *** For some commands to work properly, your symbol path *** *** must point to .pdb files that have full type information. *** *** *** *** Certain .pdb files (such as the public OS symbols) do not *** *** contain the required information. Contact the group that *** *** provided you with these symbols if you need this command to *** *** work. *** *** *** *** Type referenced: TickPeriods *** *** *** ************************************************************************* *** WARNING: Unable to verify timestamp for win32k.sys KEY_VALUES_STRING: 1 Key : Analysis.CPU.mSec Value: 6312 Key : Analysis.DebugAnalysisProvider.CPP Value: Create: 8007007e on BORA Key : Analysis.DebugData Value: CreateObject Key : Analysis.DebugModel Value: CreateObject Key : Analysis.Elapsed.mSec Value: 85138 Key : Analysis.Memory.CommitPeak.Mb Value: 76 Key : Analysis.System Value: CreateObject Key : WER.OS.Branch Value: vb_release Key : WER.OS.Timestamp Value: 2019-12-06T14:06:00Z Key : WER.OS.Version Value: 10.0.19041.1 ADDITIONAL_XML: 1 OS_BUILD_LAYERS: 1 BUGCHECK_CODE: 133 BUGCHECK_P1: 1 BUGCHECK_P2: 1e00 BUGCHECK_P3: fffff800264fa320 BUGCHECK_P4: 0 DPC_TIMEOUT_TYPE: DPC_QUEUE_EXECUTION_TIMEOUT_EXCEEDED TRAP_FRAME: fffff8002beafb30 -- (.trap 0xfffff8002beafb30) NOTE: The trap frame does not contain all registers. Some register values may be zeroed or incorrect. rax=0000000000000004 rbx=0000000000000000 rcx=0000000000000440 rdx=ffffc78dcd314000 rsi=0000000000000000 rdi=0000000000000000 rip=fffff8004180bf7d rsp=fffff8002beafcc8 rbp=0000000000000000 r8=ffffc78dcd3151d8 r9=0000000000001100 r10=ffffc78dcaf51c20 r11=000000000000000e r12=0000000000000000 r13=0000000000000000 r14=0000000000000000 r15=0000000000000000 iopl=0 nv up ei pl nz na pe nc nvlddmkm+0xfbf7d: fffff800`4180bf7d c3 ret Resetting default scope BLACKBOXBSD: 1 (!blackboxbsd) BLACKBOXNTFS: 1 (!blackboxntfs) BLACKBOXWINLOGON: 1 CUSTOMER_CRASH_COUNT: 1 PROCESS_NAME: System STACK_TEXT: fffff800`2bebfe18 fffff800`25c3aa0c : 00000000`00000133 00000000`00000001 00000000`00001e00 fffff800`264fa320 : nt!KeBugCheckEx fffff800`2bebfe20 fffff800`25a6f9a3 : 00000737`ec3204c8 fffff800`23e9f180 00000000`00000000 fffff800`23e9f180 : nt!KeAccumulateTicks+0x1c880c fffff800`2bebfe80 fffff800`25a6f48a : fffff800`264f3840 fffff800`2beafbb0 fffff800`2b287900 00000000`0000a101 : nt!KeClockInterruptNotify+0x453 fffff800`2bebff30 fffff800`25b27ef5 : fffff800`264f3840 fffff800`2bebff40 00000000`00000010 ffffe3c7`2cb636f0 : nt!HalpTimerClockIpiRoutine+0x1a fffff800`2bebff60 fffff800`25bf722a : fffff800`2beafbb0 fffff800`264f3840 00000000`00000000 00000000`00000000 : nt!KiCallInterruptServiceRoutine+0xa5 fffff800`2bebffb0 fffff800`25bf7797 : 00000000`00000000 00000000`00000000 ffffc78d`00000000 ffff29e6`4e9e505b : nt!KiInterruptSubDispatchNoLockNoEtw+0xfa fffff800`2beafb30 fffff800`4180bf7d : fffff800`41c340e5 ffffc78d`caf24aa0 00000000`badf1002 00000000`00000000 : nt!KiInterruptDispatchNoLockNoEtw+0x37 fffff800`2beafcc8 fffff800`41c340e5 : ffffc78d`caf24aa0 00000000`badf1002 00000000`00000000 00000000`00000000 : nvlddmkm+0xfbf7d fffff800`2beafcd0 ffffc78d`caf24aa0 : 00000000`badf1002 00000000`00000000 00000000`00000000 00000000`00000000 : nvlddmkm+0x5240e5 fffff800`2beafcd8 00000000`badf1002 : 00000000`00000000 00000000`00000000 00000000`00000000 fffff800`41c29987 : 0xffffc78d`caf24aa0 fffff800`2beafce0 00000000`00000000 : 00000000`00000000 00000000`00000000 fffff800`41c29987 ffffc78d`cd314000 : 0xbadf1002 SYMBOL_NAME: nvlddmkm+fbf7d MODULE_NAME: nvlddmkm IMAGE_NAME: nvlddmkm.sys STACK_COMMAND: .thread ; .cxr ; kb BUCKET_ID_FUNC_OFFSET: fbf7d FAILURE_BUCKET_ID: 0x133_ISR_nvlddmkm!unknown_function OS_VERSION: 10.0.19041.1 BUILDLAB_STR: vb_release OSPLATFORM_TYPE: x64 OSNAME: Windows 10 FAILURE_ID_HASH: {f97493a5-ea2b-23ca-a808-8602773c2a86} Followup: MachineOwner ---------
Bu sitenin çalışmasını sağlamak için gerekli çerezleri ve deneyiminizi iyileştirmek için isteğe bağlı çerezleri kullanıyoruz.