DPC watchdog violation hatası

Flapjacks

Hectopat
Katılım
7 Temmuz 2020
Mesajlar
113
Sisteme yeni ekran kartı aldım GeForce Experience ile yayın açmaya çalıştığımda 5 dk yayın yapıp mavi ekran hatası veriyor, sorun nedir? (Sistem i5-8400, 1660S. 12 GB RAM)
 
 
Hatalı arkadaş şu 😅 ==>ntoskrnl.exe
Şu rehberde yapılanları uygulamayı deneyin.
 
Cfosspeed adlı yapımcının programlarını kullanıyorsanız kaldırın. Ağ kartı sürücüsünü güncelleyiniz.
Kaspersky güncelleyin güncelse şu anlık kaldırın.
Kod:
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

DPC_WATCHDOG_VIOLATION (133)
The DPC watchdog detected a prolonged run time at an IRQL of DISPATCH_LEVEL
or above.
Arguments:
Arg1: 0000000000000000, A single DPC or ISR exceeded its time allotment. The offending
    component can usually be identified with a stack trace.
Arg2: 0000000000000501, The DPC time count (in ticks).
Arg3: 0000000000000500, The DPC time allotment (in ticks).
Arg4: fffff8000eafa320

Debugging Details:
------------------

*************************************************************************
***                                                                   ***
***                                                                   ***
***    Either you specified an unqualified symbol, or your debugger   ***
***    doesn't have full symbol information.  Unqualified symbol      ***
***    resolution is turned off by default. Please either specify a   ***
***    fully qualified symbol module!symbolname, or enable resolution ***
***    of unqualified symbols by typing ".symopt- 100". Note that   ***
***    enabling unqualified symbol resolution with network symbol     ***
***    server shares in the symbol path may cause the debugger to     ***
***    appear to hang for long periods of time when an incorrect      ***
***    symbol name is typed or the network symbol server is down.     ***
***                                                                   ***
***    For some commands to work properly, your symbol path           ***
***    must point to .pdb files that have full type information.      ***
***                                                                   ***
***    Certain .pdb files (such as the public OS symbols) do not      ***
***    contain the required information.  Contact the group that      ***
***    provided you with these symbols if you need this command to    ***
***    work.                                                          ***
***                                                                   ***
***    Type referenced: TickPeriods                                   ***
***                                                                   ***
*************************************************************************

DPC_TIMEOUT_TYPE:  SINGLE_DPC_TIMEOUT_EXCEEDED

CUSTOMER_CRASH_COUNT:  1

DEFAULT_BUCKET_ID:  CODE_CORRUPTION

BUGCHECK_STR:  0x133

PROCESS_NAME:  System

CURRENT_IRQL:  d

ANALYSIS_VERSION: 6.3.9600.17237 (debuggers(dbg).140716-0327) x86fre

TRAP_FRAME:  ffffb487e6276c70 -- (.trap 0xffffb487e6276c70)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=00000000c2ed002f rbx=0000000000000000 rcx=ffffb70400000000
rdx=ffffb70400000000 rsi=0000000000000000 rdi=0000000000000000
rip=fffff8000e1fbdd7 rsp=ffffb487e6276e00 rbp=0000000000000001
r8=ffffb70400000000  r9=ffffb7047b69ce40 r10=ffffb7047b69d580
r11=000000000000004f r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0         nv up ei ng nz na po nc
nt!ExpInterlockedPopEntrySListFault:
fffff800`0e1fbdd7 498b08          mov     rcx,qword ptr [r8] ds:ffffb704`00000000=????????????????
Resetting default scope

LAST_CONTROL_TRANSFER:  from fffff8000e27955a to fffff8000e1f3ea0

STACK_TEXT:
ffff9380`ca5b6e18 fffff800`0e27955a : 00000000`00000133 00000000`00000000 00000000`00000501 00000000`00000500 : nt!KeBugCheckEx
ffff9380`ca5b6e20 fffff800`0e10518d : 0000010f`d74a45eb 00000000`00000000 ffffb487`e6276b00 ffff9380`ca59d180 : nt!KeAccumulateTicks+0x17110a
ffff9380`ca5b6e80 fffff800`0e10500a : ffffb704`798de600 ffffb487`e6276b60 00000000`00006382 00000000`00000003 : nt!KeClockInterruptNotify+0xbd
ffff9380`ca5b6f30 fffff800`0e080795 : ffffb704`798de600 00000000`00000000 00000000`00000000 ffff1e84`b8cc0d0e : nt!HalpTimerClockIpiRoutine+0x1a
ffff9380`ca5b6f60 fffff800`0e1f594a : ffffb487`e6276b60 ffffb704`798de600 00000000`00000001 f9a827e7`c5a896ab : nt!KiCallInterruptServiceRoutine+0xa5
ffff9380`ca5b6fb0 fffff800`0e1f5eb7 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiInterruptSubDispatchNoLockNoEtw+0xfa
ffffb487`e6276ae0 fffff800`0e202015 : ffffb704`8d01b8c0 00000000`00000000 00000000`5f636357 00000000`0000016a : nt!KiInterruptDispatchNoLockNoEtw+0x37
ffffb487`e6276c70 fffff800`0e1fbdd7 : ffffb704`7b69d580 fffff800`12e5b4cc 00000000`00000000 00000000`00000000 : nt!KiPageFault+0x315
ffffb487`e6276e00 fffff800`12e5b4cc : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!ExpInterlockedPopEntrySListFault
ffffb487`e6276e10 fffff800`12e423d4 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : NETIO!PplGenericAllocateFunction+0x1c
ffffb487`e6276e50 fffff800`131d135c : 00000000`00000000 ffffb704`8d01b8c0 ffffb704`82760bc0 00000000`00000000 : NETIO!WfpNblInfoAlloc+0x94
ffffb487`e6276e90 fffff800`131d12bb : 00000000`00000000 ffffb704`85659ae0 ffffb704`82760bc0 fffff800`2a496d7c : fwpkclnt!FwppNetBufferListAssociateContext+0x7c
ffffb487`e6276f30 fffff800`2a4943bd : 00000000`00000002 ffffb704`8ab293b0 ffffb487`e6277210 fffff800`131d1200 : fwpkclnt!FwpsNetBufferListAssociateContext1+0x7b
ffffb487`e6276f90 fffff800`12e58c5f : 00000000`00000000 ffffb487`e6277099 00000000`00000000 ffffb487`e6277360 : Ndu!NduOutboundTransportClassify+0x24d
ffffb487`e6277030 fffff800`12f3cdab : ffffb704`820c5b10 00000000`00000004 ffffb704`89680310 ffffb704`89680310 : NETIO!KfdClassify2+0x19f
ffffb487`e6277100 fffff800`12f3bfdb : ffffb704`7b7c4988 00000000`00000000 fffff800`0000001e 00000000`00000202 : tcpip!IppInspectLocalDatagramsOut+0x6cb
ffffb487`e62773d0 fffff800`12f38a09 : 00000000`00000000 00000000`00000000 fffff800`130da230 ffffb704`89680310 : tcpip!IppSendDatagramsCommon+0x41b
ffffb487`e6277550 fffff800`12f48ca5 : ffffb704`85399ee0 00000000`00000014 00000000`00000000 ffffb704`849d5040 : tcpip!IpNlpFastSendDatagram+0x349
ffffb487`e6277610 fffff800`12f2aa33 : 00000000`00000000 00000000`00000005 ffffb487`00000006 00000000`0005c53c : tcpip!TcpTcbSend+0x6d5
ffffb487`e6277990 fffff800`0e0e9a3e : ffff9380`ca5a0240 ffffb704`79a1f000 ffffb487`e6277e70 ffff9380`ca59d180 : tcpip!TcpPeriodicTimeoutHandler+0x1683
ffffb487`e6277bb0 fffff800`0e0e8d24 : ffff9380`ca59d180 00000000`00000000 00000000`00000008 00000000`00003704 : nt!KiExecuteAllDpcs+0x30e
ffffb487`e6277d20 fffff800`0e1faee5 : 00000000`00000000 ffff9380`ca59d180 00000000`00000000 ffffb487`e69af750 : nt!KiRetireDpcList+0x1f4
ffffb487`e6277fb0 fffff800`0e1facd0 : ffff9380`ca59d180 fffff800`0e0c92ea 00000000`00000000 ffffb704`00000000 : nt!KxRetireDpcList+0x5
ffffb487`e69af530 fffff800`0e1fa39e : 00000000`00000002 00000000`3fffffff ffffb704`859c2b30 ffffb704`8cff4cc0 : nt!KiDispatchInterruptContinue
ffffb487`e69af560 fffff800`0e120d50 : fffff800`28e3de1e ffffb487`e69af750 ffffb487`e69af920 00000000`00000018 : nt!KiDpcInterrupt+0x2ee
ffffb487`e69af6f8 fffff800`28e3de1e : ffffb487`e69af750 ffffb487`e69af920 00000000`00000018 fffff800`28e929ac : nt!KzLowerIrql+0x20
ffffb487`e69af700 ffffb487`e69af750 : ffffb487`e69af920 00000000`00000018 fffff800`28e929ac ffffb704`7bbe9040 : cfosspeed6+0xade1e
ffffb487`e69af708 ffffb487`e69af920 : 00000000`00000018 fffff800`28e929ac ffffb704`7bbe9040 fffff800`28e3e34d : 0xffffb487`e69af750
ffffb487`e69af710 00000000`00000018 : fffff800`28e929ac ffffb704`7bbe9040 fffff800`28e3e34d ffffb704`8686bc90 : 0xffffb487`e69af920
ffffb487`e69af718 fffff800`28e929ac : ffffb704`7bbe9040 fffff800`28e3e34d ffffb704`8686bc90 ffffb487`e69af930 : 0x18
ffffb487`e69af720 ffffb704`7bbe9040 : fffff800`28e3e34d ffffb704`8686bc90 ffffb487`e69af930 ffffb487`e69af7d0 : cfosspeed6+0x1029ac
ffffb487`e69af728 fffff800`28e3e34d : ffffb704`8686bc90 ffffb487`e69af930 ffffb487`e69af7d0 00000000`00000000 : 0xffffb704`7bbe9040
ffffb487`e69af730 ffffb704`8686bc90 : ffffb487`e69af930 ffffb487`e69af7d0 00000000`00000000 00000000`00000000 : cfosspeed6+0xae34d
ffffb487`e69af738 ffffb487`e69af930 : ffffb487`e69af7d0 00000000`00000000 00000000`00000000 ffffb704`8686be20 : 0xffffb704`8686bc90
ffffb487`e69af740 ffffb487`e69af7d0 : 00000000`00000000 00000000`00000000 ffffb704`8686be20 ffffb487`e69af800 : 0xffffb487`e69af930
ffffb487`e69af748 00000000`00000000 : 00000000`00000000 ffffb704`8686be20 ffffb487`e69af800 fffff800`28f1b900 : 0xffffb487`e69af7d0


STACK_COMMAND:  kb

CHKIMG_EXTENSION: !chkimg -lo 50 -d !nt
    fffff8000e0ee812 - nt!MmAccessFault+92
    [ f6:87 ]
    fffff8000e1963ae-fffff8000e1963b1  4 bytes - nt!MiFreeUltraMapping+32 (+0xa7b9c)
    [ a0 7d fb f6:e0 e1 c3 87 ]
5 errors : !nt (fffff8000e0ee812-fffff8000e1963b1)

MODULE_NAME: memory_corruption

IMAGE_NAME:  memory_corruption

FOLLOWUP_NAME:  memory_corruption

DEBUG_FLR_IMAGE_TIMESTAMP:  0

MEMORY_CORRUPTOR:  LARGE

FAILURE_BUCKET_ID:  MEMORY_CORRUPTION_LARGE

BUCKET_ID:  MEMORY_CORRUPTION_LARGE

ANALYSIS_SOURCE:  KM

FAILURE_ID_HASH_STRING:  km:memory_corruption_large

FAILURE_ID_HASH:  {e29154ac-69a4-0eb8-172a-a860f73c0a3c}

Followup: memory_corruption
---------
Sürücüsünü güncellemeyi bilmiyorsanız donanım kimliklerini paylaşınız.
Hatalı arkadaş ntoskrnl.exe değil hataya yol açan dosyalar ndu.sys ve cfosspeed.sys adlı dosyalar. Bluescreen Viewer ile bakınca dump dosyalarına doğru sonuçlar çıkmayabiliyor. Onun için WinDbg ile bakınız.
 
Son düzenleme:
Cfosspeed adlı yapımcının programlarını kullanıyorsanız kaldırın. Ağ kartı sürücüsünü güncelleyiniz.
Kaspersky güncelleyin güncelse şu anlık kaldırın.
Kod:
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************

DPC_WATCHDOG_VIOLATION (133)
The DPC watchdog detected a prolonged run time at an IRQL of DISPATCH_LEVEL.
or above.
Arguments:
Arg1: 0000000000000000, A single DPC or ISR exceeded its time allotment. The offending.
component can usually be identified with a stack trace.
Arg2: 0000000000000501, The DPC time count (in ticks).
Arg3: 0000000000000500, The DPC time allotment (in ticks).
Arg4: fffff8000eafa320.

Debugging Details:
------------------

*************************************************************************
*** ***
*** ***
*** Either you specified an unqualified symbol, or your debugger ***
*** doesn't have full symbol information. Unqualified symbol ***
*** resolution is turned off by default. Please either specify a ***
*** fully qualified symbol module!symbolname, or enable resolution ***
*** of unqualified symbols by typing ".symopt- 100". Note that ***
*** enabling unqualified symbol resolution with network symbol ***
*** server shares in the symbol path may cause the debugger to ***
*** appear to hang for long periods of time when an incorrect ***
*** symbol name is typed or the network symbol server is down. ***
*** ***
*** For some commands to work properly, your symbol path ***
*** must point to .pdb files that have full type information. ***
*** ***
*** Certain .pdb files (such as the public OS symbols) do not ***
*** contain the required information. Contact the group that ***
*** provided you with these symbols if you need this command to ***
*** work. ***
*** ***
*** Type referenced: TickPeriods ***
*** ***
*************************************************************************

DPC_TIMEOUT_TYPE: SINGLE_DPC_TIMEOUT_EXCEEDED.

CUSTOMER_CRASH_COUNT: 1.

DEFAULT_BUCKET_ID: CODE_CORRUPTION.

BUGCHECK_STR: 0x133.

PROCESS_NAME: System.

CURRENT_IRQL: d.

ANALYSIS_VERSION: 6.3.9600.17237 (debuggers(dbg).140716-0327) x86fre.

TRAP_FRAME: ffffb487e6276c70 -- (.trap 0xffffb487e6276c70)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=00000000c2ed002f rbx=0000000000000000 rcx=ffffb70400000000.
rdx=ffffb70400000000 rsi=0000000000000000 rdi=0000000000000000.
rip=fffff8000e1fbdd7 rsp=ffffb487e6276e00 rbp=0000000000000001.
r8=ffffb70400000000 r9=ffffb7047b69ce40 r10=ffffb7047b69d580.
r11=000000000000004f r12=0000000000000000 r13=0000000000000000.
r14=0000000000000000 r15=0000000000000000.
iopl=0 nv up ei ng nz na po nc.
nt!ExpInterlockedPopEntrySListFault:
fffff800`0e1fbdd7 498b08 mov rcx,qword ptr [r8] ds:ffffb704`00000000=????????????????
Resetting default scope.

LAST_CONTROL_TRANSFER: from fffff8000e27955a to fffff8000e1f3ea0.

STACK_TEXT:
ffff9380`ca5b6e18 fffff800`0e27955a : 00000000`00000133 00000000`00000000 00000000`00000501 00000000`00000500 : nt!KeBugCheckEx.
ffff9380`ca5b6e20 fffff800`0e10518d : 0000010f`d74a45eb 00000000`00000000 ffffb487`e6276b00 ffff9380`ca59d180 : nt!KeAccumulateTicks+0x17110a.
ffff9380`ca5b6e80 fffff800`0e10500a : ffffb704`798de600 ffffb487`e6276b60 00000000`00006382 00000000`00000003 : nt!KeClockInterruptNotify+0xbd.
ffff9380`ca5b6f30 fffff800`0e080795 : ffffb704`798de600 00000000`00000000 00000000`00000000 ffff1e84`b8cc0d0e : nt!HalpTimerClockIpiRoutine+0x1a.
ffff9380`ca5b6f60 fffff800`0e1f594a : ffffb487`e6276b60 ffffb704`798de600 00000000`00000001 f9a827e7`c5a896ab : nt!KiCallInterruptServiceRoutine+0xa5.
ffff9380`ca5b6fb0 fffff800`0e1f5eb7 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiInterruptSubDispatchNoLockNoEtw+0xfa.
ffffb487`e6276ae0 fffff800`0e202015 : ffffb704`8d01b8c0 00000000`00000000 00000000`5f636357 00000000`0000016a : nt!KiInterruptDispatchNoLockNoEtw+0x37.
ffffb487`e6276c70 fffff800`0e1fbdd7 : ffffb704`7b69d580 fffff800`12e5b4cc 00000000`00000000 00000000`00000000 : nt!KiPageFault+0x315.
ffffb487`e6276e00 fffff800`12e5b4cc : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!ExpInterlockedPopEntrySListFault.
ffffb487`e6276e10 fffff800`12e423d4 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : NETIO!PplGenericAllocateFunction+0x1c.
ffffb487`e6276e50 fffff800`131d135c : 00000000`00000000 ffffb704`8d01b8c0 ffffb704`82760bc0 00000000`00000000 : NETIO!WfpNblInfoAlloc+0x94.
ffffb487`e6276e90 fffff800`131d12bb : 00000000`00000000 ffffb704`85659ae0 ffffb704`82760bc0 fffff800`2a496d7c : fwpkclnt!FwppNetBufferListAssociateContext+0x7c.
ffffb487`e6276f30 fffff800`2a4943bd : 00000000`00000002 ffffb704`8ab293b0 ffffb487`e6277210 fffff800`131d1200 : fwpkclnt!FwpsNetBufferListAssociateContext1+0x7b.
ffffb487`e6276f90 fffff800`12e58c5f : 00000000`00000000 ffffb487`e6277099 00000000`00000000 ffffb487`e6277360 : Ndu!NduOutboundTransportClassify+0x24d.
ffffb487`e6277030 fffff800`12f3cdab : ffffb704`820c5b10 00000000`00000004 ffffb704`89680310 ffffb704`89680310 : NETIO!KfdClassify2+0x19f.
ffffb487`e6277100 fffff800`12f3bfdb : ffffb704`7b7c4988 00000000`00000000 fffff800`0000001e 00000000`00000202 : tcpip!IppInspectLocalDatagramsOut+0x6cb.
ffffb487`e62773d0 fffff800`12f38a09 : 00000000`00000000 00000000`00000000 fffff800`130da230 ffffb704`89680310 : tcpip!IppSendDatagramsCommon+0x41b.
ffffb487`e6277550 fffff800`12f48ca5 : ffffb704`85399ee0 00000000`00000014 00000000`00000000 ffffb704`849d5040 : tcpip!IpNlpFastSendDatagram+0x349.
ffffb487`e6277610 fffff800`12f2aa33 : 00000000`00000000 00000000`00000005 ffffb487`00000006 00000000`0005c53c : tcpip!TcpTcbSend+0x6d5.
ffffb487`e6277990 fffff800`0e0e9a3e : ffff9380`ca5a0240 ffffb704`79a1f000 ffffb487`e6277e70 ffff9380`ca59d180 : tcpip!TcpPeriodicTimeoutHandler+0x1683.
ffffb487`e6277bb0 fffff800`0e0e8d24 : ffff9380`ca59d180 00000000`00000000 00000000`00000008 00000000`00003704 : nt!KiExecuteAllDpcs+0x30e.
ffffb487`e6277d20 fffff800`0e1faee5 : 00000000`00000000 ffff9380`ca59d180 00000000`00000000 ffffb487`e69af750 : nt!KiRetireDpcList+0x1f4.
ffffb487`e6277fb0 fffff800`0e1facd0 : ffff9380`ca59d180 fffff800`0e0c92ea 00000000`00000000 ffffb704`00000000 : nt!KxRetireDpcList+0x5.
ffffb487`e69af530 fffff800`0e1fa39e : 00000000`00000002 00000000`3fffffff ffffb704`859c2b30 ffffb704`8cff4cc0 : nt!KiDispatchInterruptContinue.
ffffb487`e69af560 fffff800`0e120d50 : fffff800`28e3de1e ffffb487`e69af750 ffffb487`e69af920 00000000`00000018 : nt!KiDpcInterrupt+0x2ee.
ffffb487`e69af6f8 fffff800`28e3de1e : ffffb487`e69af750 ffffb487`e69af920 00000000`00000018 fffff800`28e929ac : nt!KzLowerIrql+0x20.
ffffb487`e69af700 ffffb487`e69af750 : ffffb487`e69af920 00000000`00000018 fffff800`28e929ac ffffb704`7bbe9040 : cfosspeed6+0xade1e.
ffffb487`e69af708 ffffb487`e69af920 : 00000000`00000018 fffff800`28e929ac ffffb704`7bbe9040 fffff800`28e3e34d : 0xffffb487`e69af750.
ffffb487`e69af710 00000000`00000018 : fffff800`28e929ac ffffb704`7bbe9040 fffff800`28e3e34d ffffb704`8686bc90 : 0xffffb487`e69af920.
ffffb487`e69af718 fffff800`28e929ac : ffffb704`7bbe9040 fffff800`28e3e34d ffffb704`8686bc90 ffffb487`e69af930 : 0x18.
ffffb487`e69af720 ffffb704`7bbe9040 : fffff800`28e3e34d ffffb704`8686bc90 ffffb487`e69af930 ffffb487`e69af7d0 : cfosspeed6+0x1029ac.
ffffb487`e69af728 fffff800`28e3e34d : ffffb704`8686bc90 ffffb487`e69af930 ffffb487`e69af7d0 00000000`00000000 : 0xffffb704`7bbe9040.
ffffb487`e69af730 ffffb704`8686bc90 : ffffb487`e69af930 ffffb487`e69af7d0 00000000`00000000 00000000`00000000 : cfosspeed6+0xae34d.
ffffb487`e69af738 ffffb487`e69af930 : ffffb487`e69af7d0 00000000`00000000 00000000`00000000 ffffb704`8686be20 : 0xffffb704`8686bc90.
ffffb487`e69af740 ffffb487`e69af7d0 : 00000000`00000000 00000000`00000000 ffffb704`8686be20 ffffb487`e69af800 : 0xffffb487`e69af930.
ffffb487`e69af748 00000000`00000000 : 00000000`00000000 ffffb704`8686be20 ffffb487`e69af800 fffff800`28f1b900 : 0xffffb487`e69af7d0.

STACK_COMMAND: kb.

CHKIMG_EXTENSION: !chkimg -lo 50 -d !nt.
fffff8000e0ee812 - nt!MmAccessFault+92.
[ f6:87 ]
fffff8000e1963ae-fffff8000e1963b1 4 bytes - nt!MiFreeUltraMapping+32 (+0xa7b9c)
[ a0 7d fb f6:e0 e1 c3 87 ]
5 errors : !nt (fffff8000e0ee812-fffff8000e1963b1)

MODULE_NAME: memory_corruption.

IMAGE_NAME: memory_corruption.

FOLLOWUP_NAME: memory_corruption.

DEBUG_FLR_IMAGE_TIMESTAMP: 0.

MEMORY_CORRUPTOR: LARGE.

FAILURE_BUCKET_ID: MEMORY_CORRUPTION_LARGE.

BUCKET_ID: MEMORY_CORRUPTION_LARGE.

ANALYSIS_SOURCE: KM.

FAILURE_ID_HASH_STRING: km:memory_corruption_large.

FAILURE_ID_HASH: {e29154ac-69a4-0eb8-172a-a860f73c0a3c}

Followup: memory_corruption.
---------
Sürücüsünü güncellemeyi bilmiyorsanız donanım kimliklerini paylaşınız.
Hatalı arkadaş ntoskrnl.exe değil hataya yol açan dosyalar ndu.sys ve cfosspeed.sys adlı dosyalar. Bluescreen Viewer ile bakınca dump dosyalarına doğru sonuçlar çıkmayabiliyor. Onun için windbg ile bakınız.

Ağ kartı sürücüsünü nereden bulabilirim?
 
Cfosspeed adlı yapımcının programlarını kullanıyorsanız kaldırın. Ağ kartı sürücüsünü güncelleyiniz.
Kaspersky güncelleyin güncelse şu anlık kaldırın.
Kod:
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

DPC_WATCHDOG_VIOLATION (133)
The DPC watchdog detected a prolonged run time at an IRQL of DISPATCH_LEVEL
or above.
Arguments:
Arg1: 0000000000000000, A single DPC or ISR exceeded its time allotment. The offending
    component can usually be identified with a stack trace.
Arg2: 0000000000000501, The DPC time count (in ticks).
Arg3: 0000000000000500, The DPC time allotment (in ticks).
Arg4: fffff8000eafa320

Debugging Details:
------------------

*************************************************************************
***                                                                   ***
***                                                                   ***
***    Either you specified an unqualified symbol, or your debugger   ***
***    doesn't have full symbol information.  Unqualified symbol      ***
***    resolution is turned off by default. Please either specify a   ***
***    fully qualified symbol module!symbolname, or enable resolution ***
***    of unqualified symbols by typing ".symopt- 100". Note that   ***
***    enabling unqualified symbol resolution with network symbol     ***
***    server shares in the symbol path may cause the debugger to     ***
***    appear to hang for long periods of time when an incorrect      ***
***    symbol name is typed or the network symbol server is down.     ***
***                                                                   ***
***    For some commands to work properly, your symbol path           ***
***    must point to .pdb files that have full type information.      ***
***                                                                   ***
***    Certain .pdb files (such as the public OS symbols) do not      ***
***    contain the required information.  Contact the group that      ***
***    provided you with these symbols if you need this command to    ***
***    work.                                                          ***
***                                                                   ***
***    Type referenced: TickPeriods                                   ***
***                                                                   ***
*************************************************************************

DPC_TIMEOUT_TYPE:  SINGLE_DPC_TIMEOUT_EXCEEDED

CUSTOMER_CRASH_COUNT:  1

DEFAULT_BUCKET_ID:  CODE_CORRUPTION

BUGCHECK_STR:  0x133

PROCESS_NAME:  System

CURRENT_IRQL:  d

ANALYSIS_VERSION: 6.3.9600.17237 (debuggers(dbg).140716-0327) x86fre

TRAP_FRAME:  ffffb487e6276c70 -- (.trap 0xffffb487e6276c70)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=00000000c2ed002f rbx=0000000000000000 rcx=ffffb70400000000
rdx=ffffb70400000000 rsi=0000000000000000 rdi=0000000000000000
rip=fffff8000e1fbdd7 rsp=ffffb487e6276e00 rbp=0000000000000001
r8=ffffb70400000000  r9=ffffb7047b69ce40 r10=ffffb7047b69d580
r11=000000000000004f r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0         nv up ei ng nz na po nc
nt!ExpInterlockedPopEntrySListFault:
fffff800`0e1fbdd7 498b08          mov     rcx,qword ptr [r8] ds:ffffb704`00000000=????????????????
Resetting default scope

LAST_CONTROL_TRANSFER:  from fffff8000e27955a to fffff8000e1f3ea0

STACK_TEXT:
ffff9380`ca5b6e18 fffff800`0e27955a : 00000000`00000133 00000000`00000000 00000000`00000501 00000000`00000500 : nt!KeBugCheckEx
ffff9380`ca5b6e20 fffff800`0e10518d : 0000010f`d74a45eb 00000000`00000000 ffffb487`e6276b00 ffff9380`ca59d180 : nt!KeAccumulateTicks+0x17110a
ffff9380`ca5b6e80 fffff800`0e10500a : ffffb704`798de600 ffffb487`e6276b60 00000000`00006382 00000000`00000003 : nt!KeClockInterruptNotify+0xbd
ffff9380`ca5b6f30 fffff800`0e080795 : ffffb704`798de600 00000000`00000000 00000000`00000000 ffff1e84`b8cc0d0e : nt!HalpTimerClockIpiRoutine+0x1a
ffff9380`ca5b6f60 fffff800`0e1f594a : ffffb487`e6276b60 ffffb704`798de600 00000000`00000001 f9a827e7`c5a896ab : nt!KiCallInterruptServiceRoutine+0xa5
ffff9380`ca5b6fb0 fffff800`0e1f5eb7 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiInterruptSubDispatchNoLockNoEtw+0xfa
ffffb487`e6276ae0 fffff800`0e202015 : ffffb704`8d01b8c0 00000000`00000000 00000000`5f636357 00000000`0000016a : nt!KiInterruptDispatchNoLockNoEtw+0x37
ffffb487`e6276c70 fffff800`0e1fbdd7 : ffffb704`7b69d580 fffff800`12e5b4cc 00000000`00000000 00000000`00000000 : nt!KiPageFault+0x315
ffffb487`e6276e00 fffff800`12e5b4cc : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!ExpInterlockedPopEntrySListFault
ffffb487`e6276e10 fffff800`12e423d4 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : NETIO!PplGenericAllocateFunction+0x1c
ffffb487`e6276e50 fffff800`131d135c : 00000000`00000000 ffffb704`8d01b8c0 ffffb704`82760bc0 00000000`00000000 : NETIO!WfpNblInfoAlloc+0x94
ffffb487`e6276e90 fffff800`131d12bb : 00000000`00000000 ffffb704`85659ae0 ffffb704`82760bc0 fffff800`2a496d7c : fwpkclnt!FwppNetBufferListAssociateContext+0x7c
ffffb487`e6276f30 fffff800`2a4943bd : 00000000`00000002 ffffb704`8ab293b0 ffffb487`e6277210 fffff800`131d1200 : fwpkclnt!FwpsNetBufferListAssociateContext1+0x7b
ffffb487`e6276f90 fffff800`12e58c5f : 00000000`00000000 ffffb487`e6277099 00000000`00000000 ffffb487`e6277360 : Ndu!NduOutboundTransportClassify+0x24d
ffffb487`e6277030 fffff800`12f3cdab : ffffb704`820c5b10 00000000`00000004 ffffb704`89680310 ffffb704`89680310 : NETIO!KfdClassify2+0x19f
ffffb487`e6277100 fffff800`12f3bfdb : ffffb704`7b7c4988 00000000`00000000 fffff800`0000001e 00000000`00000202 : tcpip!IppInspectLocalDatagramsOut+0x6cb
ffffb487`e62773d0 fffff800`12f38a09 : 00000000`00000000 00000000`00000000 fffff800`130da230 ffffb704`89680310 : tcpip!IppSendDatagramsCommon+0x41b
ffffb487`e6277550 fffff800`12f48ca5 : ffffb704`85399ee0 00000000`00000014 00000000`00000000 ffffb704`849d5040 : tcpip!IpNlpFastSendDatagram+0x349
ffffb487`e6277610 fffff800`12f2aa33 : 00000000`00000000 00000000`00000005 ffffb487`00000006 00000000`0005c53c : tcpip!TcpTcbSend+0x6d5
ffffb487`e6277990 fffff800`0e0e9a3e : ffff9380`ca5a0240 ffffb704`79a1f000 ffffb487`e6277e70 ffff9380`ca59d180 : tcpip!TcpPeriodicTimeoutHandler+0x1683
ffffb487`e6277bb0 fffff800`0e0e8d24 : ffff9380`ca59d180 00000000`00000000 00000000`00000008 00000000`00003704 : nt!KiExecuteAllDpcs+0x30e
ffffb487`e6277d20 fffff800`0e1faee5 : 00000000`00000000 ffff9380`ca59d180 00000000`00000000 ffffb487`e69af750 : nt!KiRetireDpcList+0x1f4
ffffb487`e6277fb0 fffff800`0e1facd0 : ffff9380`ca59d180 fffff800`0e0c92ea 00000000`00000000 ffffb704`00000000 : nt!KxRetireDpcList+0x5
ffffb487`e69af530 fffff800`0e1fa39e : 00000000`00000002 00000000`3fffffff ffffb704`859c2b30 ffffb704`8cff4cc0 : nt!KiDispatchInterruptContinue
ffffb487`e69af560 fffff800`0e120d50 : fffff800`28e3de1e ffffb487`e69af750 ffffb487`e69af920 00000000`00000018 : nt!KiDpcInterrupt+0x2ee
ffffb487`e69af6f8 fffff800`28e3de1e : ffffb487`e69af750 ffffb487`e69af920 00000000`00000018 fffff800`28e929ac : nt!KzLowerIrql+0x20
ffffb487`e69af700 ffffb487`e69af750 : ffffb487`e69af920 00000000`00000018 fffff800`28e929ac ffffb704`7bbe9040 : cfosspeed6+0xade1e
ffffb487`e69af708 ffffb487`e69af920 : 00000000`00000018 fffff800`28e929ac ffffb704`7bbe9040 fffff800`28e3e34d : 0xffffb487`e69af750
ffffb487`e69af710 00000000`00000018 : fffff800`28e929ac ffffb704`7bbe9040 fffff800`28e3e34d ffffb704`8686bc90 : 0xffffb487`e69af920
ffffb487`e69af718 fffff800`28e929ac : ffffb704`7bbe9040 fffff800`28e3e34d ffffb704`8686bc90 ffffb487`e69af930 : 0x18
ffffb487`e69af720 ffffb704`7bbe9040 : fffff800`28e3e34d ffffb704`8686bc90 ffffb487`e69af930 ffffb487`e69af7d0 : cfosspeed6+0x1029ac
ffffb487`e69af728 fffff800`28e3e34d : ffffb704`8686bc90 ffffb487`e69af930 ffffb487`e69af7d0 00000000`00000000 : 0xffffb704`7bbe9040
ffffb487`e69af730 ffffb704`8686bc90 : ffffb487`e69af930 ffffb487`e69af7d0 00000000`00000000 00000000`00000000 : cfosspeed6+0xae34d
ffffb487`e69af738 ffffb487`e69af930 : ffffb487`e69af7d0 00000000`00000000 00000000`00000000 ffffb704`8686be20 : 0xffffb704`8686bc90
ffffb487`e69af740 ffffb487`e69af7d0 : 00000000`00000000 00000000`00000000 ffffb704`8686be20 ffffb487`e69af800 : 0xffffb487`e69af930
ffffb487`e69af748 00000000`00000000 : 00000000`00000000 ffffb704`8686be20 ffffb487`e69af800 fffff800`28f1b900 : 0xffffb487`e69af7d0


STACK_COMMAND:  kb

CHKIMG_EXTENSION: !chkimg -lo 50 -d !nt
    fffff8000e0ee812 - nt!MmAccessFault+92
    [ f6:87 ]
    fffff8000e1963ae-fffff8000e1963b1  4 bytes - nt!MiFreeUltraMapping+32 (+0xa7b9c)
    [ a0 7d fb f6:e0 e1 c3 87 ]
5 errors : !nt (fffff8000e0ee812-fffff8000e1963b1)

MODULE_NAME: memory_corruption

IMAGE_NAME:  memory_corruption

FOLLOWUP_NAME:  memory_corruption

DEBUG_FLR_IMAGE_TIMESTAMP:  0

MEMORY_CORRUPTOR:  LARGE

FAILURE_BUCKET_ID:  MEMORY_CORRUPTION_LARGE

BUCKET_ID:  MEMORY_CORRUPTION_LARGE

ANALYSIS_SOURCE:  KM

FAILURE_ID_HASH_STRING:  km:memory_corruption_large

FAILURE_ID_HASH:  {e29154ac-69a4-0eb8-172a-a860f73c0a3c}

Followup: memory_corruption
---------
Sürücüsünü güncellemeyi bilmiyorsanız donanım kimliklerini paylaşınız.
Hatalı arkadaş ntoskrnl.exe değil hataya yol açan dosyalar ndu.sys ve cfosspeed.sys adlı dosyalar. Bluescreen Viewer ile bakınca dump dosyalarına doğru sonuçlar çıkmayabiliyor. Onun için WinDbg ile bakınız.
PCI\VEN_10EC&DEV_8168&SUBSYS_7C131462&REV_15
PCI\VEN_10EC&DEV_8168&SUBSYS_7C131462
PCI\VEN_10EC&DEV_8168&CC_020000
PCI\VEN_10EC&DEV_8168&CC_0200
 
Uyarı! Bu konu 6 yıl önce açıldı.
Muhtemelen daha fazla tartışma gerekli değildir ki bu durumda yeni bir konu başlatmayı öneririz. Eğer yine de cevabınızın gerekli olduğunu düşünüyorsanız buna rağmen cevap verebilirsiniz.

Bu konuyu görüntüleyen kullanıcılar

Technopat Haberler

Geri
Yukarı