Acer Nitro 5 Laptop youtube'dan video izlerken dondu

kk44nn

Hectopat
Katılım
4 Ocak 2020
Mesajlar
51
Çözümler
1
Kod:
************* Preparing the environment for Debugger Extensions Gallery repositories **************
   ExtensionRepository : Implicit
   UseExperimentalFeatureForNugetShare : false
   AllowNugetExeUpdate : false
   AllowNugetMSCredentialProviderInstall : false
   AllowParallelInitializationOfLocalRepositories : true

   -- Configuring repositories
      ----> Repository : LocalInstalled, Enabled: true
      ----> Repository : UserExtensions, Enabled: true

>>>>>>>>>>>>> Preparing the environment for Debugger Extensions Gallery repositories completed, duration 0.000 seconds

************* Waiting for Debugger Extensions Gallery to Initialize **************

>>>>>>>>>>>>> Waiting for Debugger Extensions Gallery to Initialize completed, duration 0.031 seconds
   ----> Repository : UserExtensions, Enabled: true, Packages count: 0
   ----> Repository : LocalInstalled, Enabled: true, Packages count: 36

Microsoft (R) Windows Debugger Version 10.0.25877.1004 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.


Loading Dump File [C:\Users\Asus\Desktop\111123-21218-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available


************* Path validation summary **************
Response                         Time (ms)     Location
Deferred                                       srv*
Symbol search path is: srv*
Executable search path is:
Windows 10 Kernel Version 19041 MP (12 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS
Edition build lab: 19041.1.amd64fre.vb_release.191206-1406
Kernel base = 0xfffff801`68000000 PsLoadedModuleList = 0xfffff801`68c2a360
Debug session time: Sat Nov 11 23:03:29.367 2023 (UTC + 3:00)
System Uptime: 0 days 0:51:30.984
Loading Kernel Symbols
...............................................................
................................................................
................................................................
................
Loading User Symbols

Loading unloaded module list
..........
For analysis of this file, run !analyze -v
nt!KeBugCheckEx:
fffff801`683fd640 48894c2408      mov     qword ptr [rsp+8],rcx ss:0018:ffff9801`71f35ba0=0000000000000133
6: kd> !analyze -v
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

DPC_WATCHDOG_VIOLATION (133)
The DPC watchdog detected a prolonged run time at an IRQL of DISPATCH_LEVEL
or above.
Arguments:
Arg1: 0000000000000001, The system cumulatively spent an extended period of time at
    DISPATCH_LEVEL or above.
Arg2: 0000000000001e00, The watchdog period (in ticks).
Arg3: fffff80168cfb320, cast to nt!DPC_WATCHDOG_GLOBAL_TRIAGE_BLOCK, which contains
    additional information regarding the cumulative timeout
Arg4: 0000000000000000

Debugging Details:
------------------

*** WARNING: Unable to verify timestamp for amdkmdag.sys
*************************************************************************
***                                                                   ***
***                                                                   ***
***    Either you specified an unqualified symbol, or your debugger   ***
***    doesn't have full symbol information.  Unqualified symbol      ***
***    resolution is turned off by default. Please either specify a   ***
***    fully qualified symbol module!symbolname, or enable resolution ***
***    of unqualified symbols by typing ".symopt- 100". Note that     ***
***    enabling unqualified symbol resolution with network symbol     ***
***    server shares in the symbol path may cause the debugger to     ***
***    appear to hang for long periods of time when an incorrect      ***
***    symbol name is typed or the network symbol server is down.     ***
***                                                                   ***
***    For some commands to work properly, your symbol path           ***
***    must point to .pdb files that have full type information.      ***
***                                                                   ***
***    Certain .pdb files (such as the public OS symbols) do not      ***
***    contain the required information.  Contact the group that      ***
***    provided you with these symbols if you need this command to    ***
***    work.                                                          ***
***                                                                   ***
***    Type referenced: TickPeriods                                   ***
***                                                                   ***
*************************************************************************

KEY_VALUES_STRING: 1

    Key  : Analysis.CPU.mSec
    Value: 2827

    Key  : Analysis.Elapsed.mSec
    Value: 9921

    Key  : Analysis.IO.Other.Mb
    Value: 1

    Key  : Analysis.IO.Read.Mb
    Value: 0

    Key  : Analysis.IO.Write.Mb
    Value: 3

    Key  : Analysis.Init.CPU.mSec
    Value: 343

    Key  : Analysis.Init.Elapsed.mSec
    Value: 7489

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 98

    Key  : Bugcheck.Code.LegacyAPI
    Value: 0x133

    Key  : Failure.Bucket
    Value: 0x133_ISR_amdkmdag!unknown_function

    Key  : Failure.Hash
    Value: {ce335412-b260-6bc1-3af9-ea5584f041c4}

    Key  : WER.OS.Branch
    Value: vb_release

    Key  : WER.OS.Version
    Value: 10.0.19041.1


BUGCHECK_CODE:  133

BUGCHECK_P1: 1

BUGCHECK_P2: 1e00

BUGCHECK_P3: fffff80168cfb320

BUGCHECK_P4: 0

FILE_IN_CAB:  111123-21218-01.dmp

DPC_TIMEOUT_TYPE:  DPC_QUEUE_EXECUTION_TIMEOUT_EXCEEDED

TRAP_FRAME:  ffff980171f35d80 -- (.trap 0xffff980171f35d80)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000001 rbx=0000000000000000 rcx=ffffde044d0f8e70
rdx=000008e900000000 rsi=0000000000000000 rdi=0000000000000000
rip=fffff8016831577c rsp=ffff980171f35f10 rbp=ffffde044d0f8e70
 r8=0000000000000000  r9=ffffde0450983fc0 r10=0000000000000001
r11=0000000020004000 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0         nv up ei ng nz na pe nc
nt!KxWaitForSpinLockAndAcquire+0x2c:
fffff801`6831577c 488b07          mov     rax,qword ptr [rdi] ds:00000000`00000000=????????????????
Resetting default scope

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXPNP: 1 (!blackboxpnp)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  System

STACK_TEXT:
ffff9801`71f35f10 fffff801`682a7966     : ffff9801`72863c80 ffff9801`72863d30 ffff9801`71ee3180 ffff9801`71f35fc0 : nt!KxWaitForSpinLockAndAcquire+0x2c
ffff9801`71f35f40 fffff801`683ff35f     : ffff930d`e2a7c0e0 ffff9801`72863c80 00000000`00000000 fffff801`683ff5da : nt!KiCallInterruptServiceRoutine+0x2a6
ffff9801`71f35f90 fffff801`683ff627     : ffff930d`e2a7c084 ffffde04`00000000 00000001`00000001 0000d8ac`000080ef : nt!KiInterruptSubDispatch+0x11f
ffff930d`e2a7c060 fffff801`683195a6     : 00000000`00000001 ffff930d`e2a7c345 ffffde04`5c5e07e1 fffff801`a6d08b12 : nt!KiInterruptDispatch+0x37
ffff930d`e2a7c1f0 fffff801`68213b3d     : 00000000`00000000 fffff801`68226669 00000180`00000180 ffff930d`00000000 : nt!RtlpHpAcquireQueuedLockExclusive+0x26
ffff930d`e2a7c220 fffff801`68211be8     : 00000000`00000000 fffff801`00000270 ffff930d`e2a7c361 00000000`00000270 : nt!RtlpHpVsContextAllocateInternal+0x7d
ffff930d`e2a7c280 fffff801`689b8074     : 00000000`00000000 ffffde04`50895000 00000000`334c4144 00000000`54395810 : nt!ExAllocateHeapPool+0x888
ffff930d`e2a7c3c0 fffff801`a6cb20c6     : 00000000`00000000 00000000`00000000 ffff930d`e2a7c780 00000001`00000000 : nt!ExAllocatePoolWithTag+0x64
ffff930d`e2a7c410 00000000`00000000     : 00000000`00000000 ffff930d`e2a7c780 00000001`00000000 00000200`00000258 : amdkmdag+0x1c420c6


STACK_COMMAND:  .trap 0xffff980171f35d80 ; kb

SYMBOL_NAME:  amdkmdag+1c420c6

MODULE_NAME: amdkmdag

IMAGE_NAME:  amdkmdag.sys

BUCKET_ID_FUNC_OFFSET:  1c420c6

FAILURE_BUCKET_ID:  0x133_ISR_amdkmdag!unknown_function

OS_VERSION:  10.0.19041.1

BUILDLAB_STR:  vb_release

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

FAILURE_ID_HASH:  {ce335412-b260-6bc1-3af9-ea5584f041c4}

Followup:     MachineOwner
---------
 
Son düzenleyen: Moderatör:

Geri
Yukarı