DPC Watchdog Violation Mavi ekran hatası

KoTeaM

Decapat
Katılım
23 Mart 2020
Mesajlar
19
Daha fazla  
Cinsiyet
Erkek
Merhaba,

Henüz 1 aylık sistem. Windows 10 işletim sistemini kullanıyorum.
Bilgisayarım DPC WATCHDOG VIOLATION Mavi ekran hatası vermeye başladı, önce donuyor ve 1-2-3-4 dakika sonra kapanarak mavi ekran hatasını veriyor.
Aç ve kapa devam derken zamansız bir şekilde aynı hatayı tekrar gösteriyor. Tüm güncellemeler ve sürücüler yüklü .NET üzerinden birçok araştırma yapmama rağmen, çözümünü bulamadım. Format attım, maalesef yine aynı hatayı alıyorum. Nasıl çözümü bulabilirim? Teşekkür ederim.

  • Anakart: MSI B450M PRO- M.2 Max AMD B450 Soket AM4 DDR4 4133(OC)MHz mATX
  • Ekran Kartı: MSI GeForce GTX 1650 Super Ventus XS OC 4 GB GDDR6 128Bit DX12
  • RAM: (2x8GB) DDR4 3600MHz CL18
  • İşlemci: AMD Ryzen 5 2600 3.4GHz-3.9GHz 6/12 19MB Soket AM4 65W 12nm
  • SSD: 250 GB
  • HDD: 1 TB
  • PSU: 600V

Minidump dosyaları:
91150432_3234716029891534_6809567083261591552_n.png
 
Son düzenleyen: Moderatör:
Çıkardım hocam.
Bu arada dikkatimi çeken bir şey oldu, mouse oynatırken, imleç bir yerden bir yere ilerlediğinde, bazen kayarak gidiyor. Kasıyor gibi.
 
Monitörün hızı düşmüştü, 144 hıza tekrar yükselttim.

Hocam mavi ekran hatasına gelince, 1.5 saat aradan sonra tekrar hata verdi ve pc otomatik reset atana kadar 3 kez ard arda mavi ekran hatası verdi ve karşıma bu ekran çıktı. 'Kişisel bilgisayarımı yeniden başlat' tıkladım. Bu kez bilgisayar dondu ve şuan parola girişinde donmuş vaziyette.




90639428_208710370196062_321401997716619264_n.jpg

Hocam ard arda defalarca hatayı almaya başladım. Siteyi açıp yükleme yapıyorum, yorum yazma yerine kadar gelebiliyorum bilgisayar donuyor. Bu arada diğer çıkardığım RAM' ı tekrar yerleştirdim.

Minidump dosyası: Google Drive Link

Hocam, bir şey daha farkettim, çoğunlukla bir programı çalıştırırken veya internet sayfasını açarken hatayı veriyor. Masaüstünde normal seyirde hata vermiyor.
 
Son düzenleme:
Ağ sürücülerini kaldır tekrar yükle.
Beta BIOS'a günceller misin?

Kod:
DPC_WATCHDOG_VIOLATION (133)
The DPC watchdog detected a prolonged run time at an IRQL of DISPATCH_LEVEL
or above.
Arguments:
Arg1: 0000000000000001, The system cumulatively spent an extended period of time at
    DISPATCH_LEVEL or above. The offending component can usually be
    identified with a stack trace.
Arg2: 0000000000001e00, The watchdog period.
Arg3: fffff8035cb73358, cast to nt!DPC_WATCHDOG_GLOBAL_TRIAGE_BLOCK, which contains
    additional information regarding the cumulative timeout
Arg4: 0000000000000000

Debugging Details:
------------------

*************************************************************************
***                                                                   ***
***                                                                   ***
***    Either you specified an unqualified symbol, or your debugger   ***
***    doesn't have full symbol information.  Unqualified symbol      ***
***    resolution is turned off by default. Please either specify a   ***
***    fully qualified symbol module!symbolname, or enable resolution ***
***    of unqualified symbols by typing ".symopt- 100". Note that     ***
***    enabling unqualified symbol resolution with network symbol     ***
***    server shares in the symbol path may cause the debugger to     ***
***    appear to hang for long periods of time when an incorrect      ***
***    symbol name is typed or the network symbol server is down.     ***
***                                                                   ***
***    For some commands to work properly, your symbol path           ***
***    must point to .pdb files that have full type information.      ***
***                                                                   ***
***    Certain .pdb files (such as the public OS symbols) do not      ***
***    contain the required information.  Contact the group that      ***
***    provided you with these symbols if you need this command to    ***
***    work.                                                          ***
***                                                                   ***
***    Type referenced: TickPeriods                                   ***
***                                                                   ***
*************************************************************************

KEY_VALUES_STRING: 1


PROCESSES_ANALYSIS: 1

SERVICE_ANALYSIS: 1

STACKHASH_ANALYSIS: 1

TIMELINE_ANALYSIS: 1


DUMP_CLASS: 1

DUMP_QUALIFIER: 400

BUILD_VERSION_STRING:  18362.1.amd64fre.19h1_release.190318-1202

SYSTEM_MANUFACTURER:  Micro-Star International Co., Ltd.

SYSTEM_PRODUCT_NAME:  MS-7B84

SYSTEM_SKU:  To be filled by O.E.M.

SYSTEM_VERSION:  2.0

BIOS_VENDOR:  American Megatrends Inc.

BIOS_VERSION:  A.50

BIOS_DATE:  12/03/2019

BASEBOARD_MANUFACTURER:  Micro-Star International Co., Ltd.

BASEBOARD_PRODUCT:  B450M PRO-M2 MAX (MS-7B84)

BASEBOARD_VERSION:  2.0

DUMP_TYPE:  2

BUGCHECK_P1: 1

BUGCHECK_P2: 1e00

BUGCHECK_P3: fffff8035cb73358

BUGCHECK_P4: 0

DPC_TIMEOUT_TYPE:  DPC_QUEUE_EXECUTION_TIMEOUT_EXCEEDED

CPU_COUNT: c

CPU_MHZ: d48

CPU_VENDOR:  AuthenticAMD

CPU_FAMILY: 17

CPU_MODEL: 8

CPU_STEPPING: 2

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT:  1

DEFAULT_BUCKET_ID:  WIN8_DRIVER_FAULT

BUGCHECK_STR:  0x133

PROCESS_NAME:  svchost.exe

CURRENT_IRQL:  d

ANALYSIS_SESSION_HOST:  DESKTOP-7KGVC4E

ANALYSIS_SESSION_TIME:  03-24-2020 16:18:46.0529

ANALYSIS_VERSION: 10.0.18362.1 amd64fre

LAST_CONTROL_TRANSFER:  from fffff8035c83d8b1 to fffff8035c7c2380

STACK_TEXT: 
fffff803`62475b08 fffff803`5c83d8b1 : 00000000`00000133 00000000`00000001 00000000`00001e00 fffff803`5cb73358 : nt!KeBugCheckEx
fffff803`62475b10 fffff803`5c6b90b7 : 00000073`29edb56a fffff803`5ad12180 00000000`00000286 ffff8589`27780280 : nt!KeAccumulateTicks+0x181631
fffff803`62475b70 fffff803`5c5601e1 : fffff803`5c64e570 fffff803`5c5cbfe0 ffff8589`27780300 fffff803`5c5cc090 : nt!KeClockInterruptNotify+0xc07
fffff803`62475f30 fffff803`5c62cc75 : fffff803`5c5cbfe0 fffff803`5c669357 ffff4063`51a41700 00000000`00000000 : hal!HalpTimerClockIpiRoutine+0x21
fffff803`62475f60 fffff803`5c7c3e1a : ffff8589`27780300 fffff803`5c5cbfe0 00000000`00000000 fffff803`5c5cbfe0 : nt!KiCallInterruptServiceRoutine+0xa5
fffff803`62475fb0 fffff803`5c7c4387 : 00000000`849c24e7 ffff8589`27780300 fffff803`5c5cbfe0 00000000`0000000e : nt!KiInterruptSubDispatchNoLockNoEtw+0xfa
ffff8589`27780280 fffff803`5c64e668 : 00000000`00000000 ffff8589`27780470 ffff8589`27780478 00000000`00000000 : nt!KiInterruptDispatchNoLockNoEtw+0x37
ffff8589`27780410 fffff803`5c62d260 : 00000000`00000002 0000000c`0000000c fffff803`5ad12180 00000000`00000000 : nt!KiGenericCallDpcWorker+0xf8
ffff8589`27780470 fffff803`5c65bc17 : 00000000`00000002 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KeGenericProcessorCallback+0x124
ffff8589`277805e0 fffff803`61a58cad : ffff8589`27780770 ffff908b`1e838080 00000000`00000000 fffff803`5cc0b40f : nt!KeGenericCallDpc+0x27
ffff8589`27780620 fffff803`61a58a1f : ffff908b`15496d10 00000000`00000000 ffff908b`17937770 ffff908b`15000000 : NETIO!KfdCommitTransaction+0x51
ffff8589`27780730 fffff803`61bd9484 : 00000000`00000000 ffff908b`15a31480 ffff908b`15496d10 ffff908b`1edfe3d8 : NETIO!IoctlKfdCommitTransaction+0x6f
ffff8589`27780760 fffff803`61bd9ae2 : ffff908b`1edfe3a0 00000000`00000200 00000000`20707249 00000000`00000000 : tcpip!KfdDispatchDevCtl+0x154
ffff8589`277807f0 fffff803`5c70a939 : 00000000`000000e0 00000000`00000118 00000000`00000001 ffff908b`1edfe4b8 : tcpip!NlDispatchDeviceControl+0x42
ffff8589`27780820 fffff803`5ccb2bd5 : ffff8589`27780b80 ffff908b`1edfe3a0 00000000`00000001 ffff908b`1e4b17f0 : nt!IofCallDriver+0x59
ffff8589`27780860 fffff803`5ccb29e0 : 00000000`00000000 ffff8589`27780b80 ffff908b`1edfe3a0 ffff8589`27780b80 : nt!IopSynchronousServiceTail+0x1a5
ffff8589`27780900 fffff803`5ccb1db6 : 00000300`cb4e401c 00000000`00000000 00000000`00000000 00000000`00000000 : nt!IopXxxControlFile+0xc10
ffff8589`27780a20 fffff803`5c7d3c18 : 00000000`00000000 00000000`00000020 ffff908b`154c6500 ffffb901`887a4180 : nt!NtDeviceIoControlFile+0x56
ffff8589`27780a90 00007ffd`bbe9c1a4 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x28
00000087`cbf7ef48 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffd`bbe9c1a4


THREAD_SHA1_HASH_MOD_FUNC:  c5d286ad578ae131df97ffdd40f0def3ff71c20c

THREAD_SHA1_HASH_MOD_FUNC_OFFSET:  6c18fd30bcf10e8c718a2926708199697058f18e

THREAD_SHA1_HASH_MOD:  6ea8e425fe6531ff087bc7aa9425cdb72fb005d0

FOLLOWUP_IP:
NETIO!KfdCommitTransaction+51
fffff803`61a58cad 4d8b2e          mov     r13,qword ptr [r14]

FAULT_INSTR_CODE:  4c2e8b4d

SYMBOL_STACK_INDEX:  a

SYMBOL_NAME:  NETIO!KfdCommitTransaction+51

FOLLOWUP_NAME:  MachineOwner

MODULE_NAME: NETIO

IMAGE_NAME:  NETIO.SYS

DEBUG_FLR_IMAGE_TIMESTAMP:  0

IMAGE_VERSION:  10.0.18362.449

STACK_COMMAND:  .thread ; .cxr ; kb

BUCKET_ID_FUNC_OFFSET:  51

FAILURE_BUCKET_ID:  0x133_ISR_NETIO!KfdCommitTransaction

BUCKET_ID:  0x133_ISR_NETIO!KfdCommitTransaction

PRIMARY_PROBLEM_CLASS:  0x133_ISR_NETIO!KfdCommitTransaction

TARGET_TIME:  2020-03-23T22:42:10.000Z

OSBUILD:  18362

OSSERVICEPACK:  720

SERVICEPACK_NUMBER: 0

OS_REVISION: 0

SUITE_MASK:  272

PRODUCT_TYPE:  1

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

OSEDITION:  Windows 10 WinNt TerminalServer SingleUserTS

OS_LOCALE: 

USER_LCID:  0

OSBUILD_TIMESTAMP:  unknown_date

BUILDDATESTAMP_STR:  190318-1202

BUILDLAB_STR:  19h1_release

BUILDOSVER_STR:  10.0.18362.1.amd64fre.19h1_release.190318-1202

ANALYSIS_SESSION_ELAPSED_TIME:  5b6d

ANALYSIS_SOURCE:  KM

FAILURE_ID_HASH_STRING:  km:0x133_isr_netio!kfdcommittransaction

FAILURE_ID_HASH:  {06b0d729-30aa-9754-a174-7df5d52d08c2}

Followup:     MachineOwner
---------

DPC_WATCHDOG_VIOLATION (133)
The DPC watchdog detected a prolonged run time at an IRQL of DISPATCH_LEVEL
or above.
Arguments:
Arg1: 0000000000000001, The system cumulatively spent an extended period of time at
    DISPATCH_LEVEL or above. The offending component can usually be
    identified with a stack trace.
Arg2: 0000000000001e00, The watchdog period.
Arg3: fffff8022fb73358, cast to nt!DPC_WATCHDOG_GLOBAL_TRIAGE_BLOCK, which contains
    additional information regarding the cumulative timeout
Arg4: 0000000000000000

Debugging Details:
------------------

*************************************************************************
***                                                                   ***
***                                                                   ***
***    Either you specified an unqualified symbol, or your debugger   ***
***    doesn't have full symbol information.  Unqualified symbol      ***
***    resolution is turned off by default. Please either specify a   ***
***    fully qualified symbol module!symbolname, or enable resolution ***
***    of unqualified symbols by typing ".symopt- 100". Note that     ***
***    enabling unqualified symbol resolution with network symbol     ***
***    server shares in the symbol path may cause the debugger to     ***
***    appear to hang for long periods of time when an incorrect      ***
***    symbol name is typed or the network symbol server is down.     ***
***                                                                   ***
***    For some commands to work properly, your symbol path           ***
***    must point to .pdb files that have full type information.      ***
***                                                                   ***
***    Certain .pdb files (such as the public OS symbols) do not      ***
***    contain the required information.  Contact the group that      ***
***    provided you with these symbols if you need this command to    ***
***    work.                                                          ***
***                                                                   ***
***    Type referenced: TickPeriods                                   ***
***                                                                   ***
*************************************************************************
*** WARNING: Unable to verify timestamp for win32k.sys

KEY_VALUES_STRING: 1


PROCESSES_ANALYSIS: 1

SERVICE_ANALYSIS: 1

STACKHASH_ANALYSIS: 1

TIMELINE_ANALYSIS: 1


DUMP_CLASS: 1

DUMP_QUALIFIER: 400

BUILD_VERSION_STRING:  18362.1.amd64fre.19h1_release.190318-1202

SYSTEM_MANUFACTURER:  Micro-Star International Co., Ltd.

SYSTEM_PRODUCT_NAME:  MS-7B84

SYSTEM_SKU:  To be filled by O.E.M.

SYSTEM_VERSION:  2.0

BIOS_VENDOR:  American Megatrends Inc.

BIOS_VERSION:  A.50

BIOS_DATE:  12/03/2019

BASEBOARD_MANUFACTURER:  Micro-Star International Co., Ltd.

BASEBOARD_PRODUCT:  B450M PRO-M2 MAX (MS-7B84)

BASEBOARD_VERSION:  2.0

DUMP_TYPE:  2

BUGCHECK_P1: 1

BUGCHECK_P2: 1e00

BUGCHECK_P3: fffff8022fb73358

BUGCHECK_P4: 0

DPC_TIMEOUT_TYPE:  DPC_QUEUE_EXECUTION_TIMEOUT_EXCEEDED

CPU_COUNT: c

CPU_MHZ: d48

CPU_VENDOR:  AuthenticAMD

CPU_FAMILY: 17

CPU_MODEL: 8

CPU_STEPPING: 2

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXPNP: 1 (!blackboxpnp)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT:  1

DEFAULT_BUCKET_ID:  WIN8_DRIVER_FAULT

BUGCHECK_STR:  0x133

PROCESS_NAME:  System

CURRENT_IRQL:  d

ANALYSIS_SESSION_HOST:  DESKTOP-7KGVC4E

ANALYSIS_SESSION_TIME:  03-24-2020 16:18:51.0178

ANALYSIS_VERSION: 10.0.18362.1 amd64fre

LAST_CONTROL_TRANSFER:  from fffff8022f83d8b1 to fffff8022f7c2380

STACK_TEXT: 
fffff802`34e75b08 fffff802`2f83d8b1 : 00000000`00000133 00000000`00000001 00000000`00001e00 fffff802`2fb73358 : nt!KeBugCheckEx
fffff802`34e75b10 fffff802`2f6b8e3c : 00001328`48df53c0 fffff802`2d79b180 00000000`000602b6 00000000`000602b6 : nt!KeAccumulateTicks+0x181631
fffff802`34e75b70 fffff802`300b84b7 : fffff802`2d79b180 ffffc606`32f3eb80 ffffc606`32f3ec00 00000000`0000000c : nt!KeClockInterruptNotify+0x98c
fffff802`34e75f30 fffff802`2f62cc75 : 0000000e`54b86a07 fffff802`301260e0 fffff802`30126190 00000000`00000000 : hal!HalpTimerClockInterrupt+0xf7
fffff802`34e75f60 fffff802`2f7c3e1a : ffffc606`32f3ec00 fffff802`301260e0 00000000`00000002 fffff802`301260e0 : nt!KiCallInterruptServiceRoutine+0xa5
fffff802`34e75fb0 fffff802`2f7c4387 : ffffc606`32f3f310 ffffc606`32f3ec00 fffff802`301260e0 00000000`00000000 : nt!KiInterruptSubDispatchNoLockNoEtw+0xfa
ffffc606`32f3eb80 fffff802`2f615910 : ffffc606`32f3f310 00000000`0000000b ffffc606`32f3f410 ffff7933`71f37053 : nt!KiInterruptDispatchNoLockNoEtw+0x37
ffffc606`32f3ed10 fffff802`2f6e4042 : 00000000`00000000 ffffc606`32f3f410 fffff802`2fa68c40 fffffc4e`43b8a718 : nt!MiAgeWorkingSetTail+0x400
ffffc606`32f3ee70 fffff802`2f6e41d1 : ffffc606`32f3f410 ffffc606`32f3f410 fffff802`00000000 fffffc7e`2721dc50 : nt!MiWalkPageTablesRecursively+0x512
ffffc606`32f3ef30 fffff802`2f6e41d1 : ffffc606`32f3f410 ffffc606`32f3f410 fffff802`00000000 fffffc7e`3f1390e8 : nt!MiWalkPageTablesRecursively+0x6a1
ffffc606`32f3eff0 fffff802`2f6e41d1 : ffffc606`32f3f410 ffffc606`00000012 fffff802`00000000 fffffc7e`00000012 : nt!MiWalkPageTablesRecursively+0x6a1
ffffc606`32f3f0b0 fffff802`2f6e395c : ffffc606`32f3f410 00000000`00000000 00000000`00000000 00000000`00000000 : nt!MiWalkPageTablesRecursively+0x6a1
ffffc606`32f3f170 fffff802`2f6e33e7 : ffffc606`32f3f410 ffffc606`00000001 00000000`00000002 00000000`00000000 : nt!MiWalkPageTables+0x36c
ffffc606`32f3f270 fffff802`2f6e2b22 : ffff8c0f`30eb3300 fffff802`00000000 fffff802`300ba180 00000000`00000000 : nt!MiAgeWorkingSet+0x3a7
ffffc606`32f3f790 fffff802`2f6e243a : fffff802`2fa68c40 ffffc606`32f3fa50 00000000`00000000 00000000`00000000 : nt!MiTrimOrAgeWorkingSet+0x3b2
ffffc606`32f3f880 fffff802`2f6e0b50 : fffff802`00000000 00000000`00000000 fffff802`2fa6a3c0 ffff8c0f`26c44010 : nt!MiProcessWorkingSets+0x1fa
ffffc606`32f3fa30 fffff802`2f8ca5d6 : 00000000`00000001 00000000`00000008 00000000`ffffffff 00000000`00000001 : nt!MiWorkingSetManager+0xc8
ffffc606`32f3faf0 fffff802`2f78c8e5 : 00000000`00000008 00000000`ffffffff fffff802`2fa6a3c0 00000000`00000176 : nt!MmWorkingSetManager+0x12
ffffc606`32f3fb20 fffff802`2f66bce5 : ffff8c0f`26cd8080 00000000`00000080 fffff802`2f78c790 00000000`00000000 : nt!KeBalanceSetManager+0x155
ffffc606`32f3fc10 fffff802`2f7c99ca : ffffb301`f52db180 ffff8c0f`26cd8080 fffff802`2f66bc90 00000000`00000000 : nt!PspSystemThreadStartup+0x55
ffffc606`32f3fc60 00000000`00000000 : ffffc606`32f40000 ffffc606`32f3a000 00000000`00000000 00000000`00000000 : nt!KiStartSystemThread+0x2a


THREAD_SHA1_HASH_MOD_FUNC:  91045c574a4d944d4f03388b1c60329fe3451c29

THREAD_SHA1_HASH_MOD_FUNC_OFFSET:  8846bbc7b8223783d10b843ee7b9d8cc5c2322d0

THREAD_SHA1_HASH_MOD:  633f0400a9aeb3d63bb764dc6df354c8174d7b73

FOLLOWUP_IP:
nt!KeAccumulateTicks+181631
fffff802`2f83d8b1 cc              int     3

FAULT_INSTR_CODE:  ab3944cc

SYMBOL_STACK_INDEX:  1

SYMBOL_NAME:  nt!KeAccumulateTicks+181631

FOLLOWUP_NAME:  MachineOwner

MODULE_NAME: nt

IMAGE_NAME:  ntkrnlmp.exe

DEBUG_FLR_IMAGE_TIMESTAMP:  0

IMAGE_VERSION:  10.0.18362.720

STACK_COMMAND:  .thread ; .cxr ; kb

BUCKET_ID_FUNC_OFFSET:  181631

FAILURE_BUCKET_ID:  0x133_ISR_nt!KeAccumulateTicks

BUCKET_ID:  0x133_ISR_nt!KeAccumulateTicks

PRIMARY_PROBLEM_CLASS:  0x133_ISR_nt!KeAccumulateTicks

TARGET_TIME:  2020-03-23T22:35:50.000Z

OSBUILD:  18362

OSSERVICEPACK:  720

SERVICEPACK_NUMBER: 0

OS_REVISION: 0

SUITE_MASK:  272

PRODUCT_TYPE:  1

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

OSEDITION:  Windows 10 WinNt TerminalServer SingleUserTS

OS_LOCALE: 

USER_LCID:  0

OSBUILD_TIMESTAMP:  unknown_date

BUILDDATESTAMP_STR:  190318-1202

BUILDLAB_STR:  19h1_release

BUILDOSVER_STR:  10.0.18362.1.amd64fre.19h1_release.190318-1202

ANALYSIS_SESSION_ELAPSED_TIME:  4e6c

ANALYSIS_SOURCE:  KM

FAILURE_ID_HASH_STRING:  km:0x133_isr_nt!keaccumulateticks

FAILURE_ID_HASH:  {65350307-c3b9-f4b5-8829-4d27e9ff9b06}

Followup:     MachineOwner
---------
DPC_WATCHDOG_VIOLATION (133)
The DPC watchdog detected a prolonged run time at an IRQL of DISPATCH_LEVEL
or above.
Arguments:
Arg1: 0000000000000001, The system cumulatively spent an extended period of time at
    DISPATCH_LEVEL or above. The offending component can usually be
    identified with a stack trace.
Arg2: 0000000000001e00, The watchdog period.
Arg3: fffff8064eb73358, cast to nt!DPC_WATCHDOG_GLOBAL_TRIAGE_BLOCK, which contains
    additional information regarding the cumulative timeout
Arg4: 0000000000000000

Debugging Details:
------------------

*************************************************************************
***                                                                   ***
***                                                                   ***
***    Either you specified an unqualified symbol, or your debugger   ***
***    doesn't have full symbol information.  Unqualified symbol      ***
***    resolution is turned off by default. Please either specify a   ***
***    fully qualified symbol module!symbolname, or enable resolution ***
***    of unqualified symbols by typing ".symopt- 100". Note that     ***
***    enabling unqualified symbol resolution with network symbol     ***
***    server shares in the symbol path may cause the debugger to     ***
***    appear to hang for long periods of time when an incorrect      ***
***    symbol name is typed or the network symbol server is down.     ***
***                                                                   ***
***    For some commands to work properly, your symbol path           ***
***    must point to .pdb files that have full type information.      ***
***                                                                   ***
***    Certain .pdb files (such as the public OS symbols) do not      ***
***    contain the required information.  Contact the group that      ***
***    provided you with these symbols if you need this command to    ***
***    work.                                                          ***
***                                                                   ***
***    Type referenced: TickPeriods                                   ***
***                                                                   ***
*************************************************************************

KEY_VALUES_STRING: 1


PROCESSES_ANALYSIS: 1

SERVICE_ANALYSIS: 1

STACKHASH_ANALYSIS: 1

TIMELINE_ANALYSIS: 1


DUMP_CLASS: 1

DUMP_QUALIFIER: 400

BUILD_VERSION_STRING:  18362.1.amd64fre.19h1_release.190318-1202

SYSTEM_MANUFACTURER:  Micro-Star International Co., Ltd.

SYSTEM_PRODUCT_NAME:  MS-7B84

SYSTEM_SKU:  To be filled by O.E.M.

SYSTEM_VERSION:  2.0

BIOS_VENDOR:  American Megatrends Inc.

BIOS_VERSION:  A.50

BIOS_DATE:  12/03/2019

BASEBOARD_MANUFACTURER:  Micro-Star International Co., Ltd.

BASEBOARD_PRODUCT:  B450M PRO-M2 MAX (MS-7B84)

BASEBOARD_VERSION:  2.0

DUMP_TYPE:  2

BUGCHECK_P1: 1

BUGCHECK_P2: 1e00

BUGCHECK_P3: fffff8064eb73358

BUGCHECK_P4: 0

DPC_TIMEOUT_TYPE:  DPC_QUEUE_EXECUTION_TIMEOUT_EXCEEDED

CPU_COUNT: c

CPU_MHZ: d48

CPU_VENDOR:  AuthenticAMD

CPU_FAMILY: 17

CPU_MODEL: 8

CPU_STEPPING: 2

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT:  1

DEFAULT_BUCKET_ID:  WIN8_DRIVER_FAULT

BUGCHECK_STR:  0x133

PROCESS_NAME:  explorer.exe

CURRENT_IRQL:  d

ANALYSIS_SESSION_HOST:  DESKTOP-7KGVC4E

ANALYSIS_SESSION_TIME:  03-24-2020 16:18:59.0637

ANALYSIS_VERSION: 10.0.18362.1 amd64fre

LAST_CONTROL_TRANSFER:  from fffff8064e83d8b1 to fffff8064e7c2380

STACK_TEXT: 
ffff8481`fc33db08 fffff806`4e83d8b1 : 00000000`00000133 00000000`00000001 00000000`00001e00 fffff806`4eb73358 : nt!KeBugCheckEx
ffff8481`fc33db10 fffff806`4e6b90b7 : 0000008d`fb248947 ffff8481`fc7c0180 00000000`00000286 fffffe09`8b2ec0a0 : nt!KeAccumulateTicks+0x181631
ffff8481`fc33db70 fffff806`4f0ba1e1 : 00000000`00000001 ffffab0d`6cccf000 fffffe09`8b2ec120 ffffab0d`6cccf0b0 : nt!KeClockInterruptNotify+0xc07
ffff8481`fc33df30 fffff806`4e62cc75 : ffffab0d`6cccf000 fffff806`4e669357 00000000`00000000 00000000`00000000 : hal!HalpTimerClockIpiRoutine+0x21
ffff8481`fc33df60 fffff806`4e7c3e1a : fffffe09`8b2ec120 ffffab0d`6cccf000 00000000`00000002 ffffab0d`6cccf000 : nt!KiCallInterruptServiceRoutine+0xa5
ffff8481`fc33dfb0 fffff806`4e7c4387 : 00000000`58f7542c fffffe09`8b2ec120 ffffab0d`6cccf000 00000000`00000000 : nt!KiInterruptSubDispatchNoLockNoEtw+0xfa
fffffe09`8b2ec0a0 fffff806`4e6eaa0e : 00000000`00005600 ffff8481`fc7c0180 00000000`00000000 00000000`00000000 : nt!KiInterruptDispatchNoLockNoEtw+0x37
fffffe09`8b2ec230 fffff806`4e6a9f9b : fffffe09`8b2ec480 00000000`000056b0 fffffe09`8b2ec480 00000000`00000001 : nt!MiFlushTbList+0x39e
fffffe09`8b2ec380 fffff806`4e6aace0 : 00000000`00000000 00000000`00000000 ffffd573`9a4221e8 ffffd56a`b9cd2110 : nt!MiFlushTbAsNeeded+0x14b
fffffe09`8b2ec4d0 fffff806`4e6aaa08 : ffffd573`9a4221e8 00000000`00000001 00000000`00000001 fffffe09`8b2ec591 : nt!MiLinkPoolCommitChain+0x60
fffffe09`8b2ec520 fffff806`4e6aa647 : 00000000`00001000 00000000`00001001 00000000`00000000 00000000`00000000 : nt!MiCommitPoolMemory+0x118
fffffe09`8b2ec5f0 fffff806`4e6aa4d8 : 00000000`00001000 fffffe09`8b2ec690 00000000`00001001 00000000`00000fc3 : nt!MmAllocatePoolMemory+0x7b
fffffe09`8b2ec650 fffff806`4e6aa324 : ffffe734`8443d000 fffffe09`8b2ec7b8 00000000`00001000 ffffe734`80200100 : nt!RtlpHpEnvAllocVA+0xc8
fffffe09`8b2ec6c0 fffff806`4e6a9be8 : 00000000`00001000 fffff806`4e71255d ffffe734`844007c0 fffff806`4e6a75bd : nt!RtlpHpAllocVA+0xf8
fffffe09`8b2ec780 fffff806`4e6a6b8c : 00000001`00000000 ffffe734`84400000 00000000`00000001 fffff806`4ea6c048 : nt!RtlpHpSegMgrCommit+0x108
fffffe09`8b2ec870 fffff806`4e70b344 : 00000000`00001000 00000000`00001000 ffffee00`00000001 fffffe09`00000000 : nt!RtlpHpSegAlloc+0x2fc
fffffe09`8b2ec920 fffff806`4e96f08d : ffffe734`00000021 00000000`00000000 00000000`00000000 00000000`00001000 : nt!ExAllocateHeapPool+0x284
fffffe09`8b2eca60 ffffe76a`35065314 : ffffe734`80602080 fffffe09`8b2eccd0 00000000`6f746547 fffffe09`00000000 : nt!ExAllocatePoolWithTag+0x5d
fffffe09`8b2ecab0 ffffe76a`353d305a : fffffe09`6f746547 fffffe09`8b2ecebc 00000000`00000021 00000000`00000054 : win32kfull!Win32AllocPoolImpl+0x34
fffffe09`8b2ecb80 ffffe76a`350c785d : 00000000`fffffff2 00000000`00000001 fffffe09`8b2ecef0 ffffe734`80911000 : win32kbase!AllocThreadBufferWithTag+0x5a
fffffe09`8b2ecbb0 ffffe76a`350d8e34 : ffffe734`00000000 ffffe734`8428c010 fffffe09`00ffffff ffffe734`8428c648 : win32kfull!EngTextOut+0x49d
fffffe09`8b2ed0b0 ffffe76a`350d6f0b : 00000000`008da300 fffffe09`8b2ed810 fffffe09`8b2ed978 00000000`00000000 : win32kfull!GreExtTextOutWLocked+0x1d24
fffffe09`8b2ed860 ffffe76a`350d59da : 00000000`00000007 ffffab0d`73b6b790 fffffe09`00000000 ffffe734`00ffffff : win32kfull!GreBatchTextOut+0x21b
fffffe09`8b2ed900 ffffe76a`350d56c4 : 00000000`00000007 ffffab0d`73b6b790 00000000`00000000 00000000`00000000 : win32kfull!NtGdiFlushUserBatchInternal+0x30a
fffffe09`8b2edb80 ffffe76a`353d2990 : fffffe09`8b2edc30 00000000`00000000 fffffe09`8b2edd30 00000000`00000000 : win32kfull!NtGdiFlushUserBatch+0x24
fffffe09`8b2edbc0 ffffe76a`35dc1040 : ffffab0d`73b6b790 ffffe76a`3506e244 00000000`80000000 00000000`00000000 : win32kbase!W32CalloutDispatch+0x90
fffffe09`8b2edde0 fffff806`4ec7cc21 : 00000000`00000000 00000000`00000007 00007ffe`74d50000 00000000`00000000 : win32k!W32CalloutDispatchThunk+0x10
fffffe09`8b2ede10 fffff806`4e7d3b18 : 00000000`00001388 fffffe09`8b2edec0 00000000`00000020 ffffe76a`35dc2468 : nt!PsInvokeWin32Callout+0x51
fffffe09`8b2ede40 00007ffe`74b213a4 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceGdiTebAccess+0x31
00000000`074aca18 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffe`74b213a4


THREAD_SHA1_HASH_MOD_FUNC:  902d8b3c6b866c79267bd74b4279723d0403b121

THREAD_SHA1_HASH_MOD_FUNC_OFFSET:  b6efcace99d708a09f817400795228b62ae424af

THREAD_SHA1_HASH_MOD:  508bec189b952a485cfe5027adb94aa19b064ee3

FOLLOWUP_IP:
win32kfull!Win32AllocPoolImpl+34
ffffe76a`35065314 4881c4c0000000  add     rsp,0C0h

FAULT_INSTR_CODE:  c0c48148

SYMBOL_STACK_INDEX:  12

SYMBOL_NAME:  win32kfull!Win32AllocPoolImpl+34

FOLLOWUP_NAME:  MachineOwner

MODULE_NAME: win32kfull

IMAGE_NAME:  win32kfull.sys

DEBUG_FLR_IMAGE_TIMESTAMP:  d8fde2a

IMAGE_VERSION:  10.0.18362.719

STACK_COMMAND:  .thread ; .cxr ; kb

BUCKET_ID_FUNC_OFFSET:  34

FAILURE_BUCKET_ID:  0x133_ISR_win32kfull!Win32AllocPoolImpl

BUCKET_ID:  0x133_ISR_win32kfull!Win32AllocPoolImpl

PRIMARY_PROBLEM_CLASS:  0x133_ISR_win32kfull!Win32AllocPoolImpl

TARGET_TIME:  2020-03-23T22:39:30.000Z

OSBUILD:  18362

OSSERVICEPACK:  720

SERVICEPACK_NUMBER: 0

OS_REVISION: 0

SUITE_MASK:  272

PRODUCT_TYPE:  1

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

OSEDITION:  Windows 10 WinNt TerminalServer SingleUserTS

OS_LOCALE: 

USER_LCID:  0

OSBUILD_TIMESTAMP:  unknown_date

BUILDDATESTAMP_STR:  190318-1202

BUILDLAB_STR:  19h1_release

BUILDOSVER_STR:  10.0.18362.1.amd64fre.19h1_release.190318-1202

ANALYSIS_SESSION_ELAPSED_TIME:  686c

ANALYSIS_SOURCE:  KM

FAILURE_ID_HASH_STRING:  km:0x133_isr_win32kfull!win32allocpoolimpl

FAILURE_ID_HASH:  {35f43c73-ed2f-55c6-086d-4117b6e40aa6}

Followup:     MachineOwner
---------
 
Hocam, Ağ sürücülerini tamamen kaldırıp, bilgisayarı yeniden başlattım. Sürücüyü en son yayımlanan sürüm ile değiştirdim.
İkinci olarak bir şey farkettim, burada (Değer) devre dışı hocam bilginiz var mı?
Aynı sürücüyü Laptop bilgisayarımdan kontrol ettim, orada Etkinleştirildi yazıyor.
realtekpcı.png


BIOS 7B84vA61 olarak güncelledim ama BIOS güncellemesi bittikten sonra bilgisayar yeniden başlatıldı ve masaüstünü gördüğüm gibi, mavi ekran hatasını verdi. Minidump klasörünü kontrol ettim, dosya yok.
 
Uyarı! Bu konu 6 yıl önce açıldı.
Muhtemelen daha fazla tartışma gerekli değildir ki bu durumda yeni bir konu başlatmayı öneririz. Eğer yine de cevabınızın gerekli olduğunu düşünüyorsanız buna rağmen cevap verebilirsiniz.

Technopat Haberler

Geri
Yukarı