TIMER_OR_DPC_INVALID (c7) mavi ekran hatası

İşletim sistemi
Windows 10

TheEnjoYu

Femtopat
Katılım
19 Mart 2021
Mesajlar
12
Yer
Eskişehir
Daha fazla  
Cinsiyet
Erkek
@Recep Baltaş hocam bakar mısın?
Buraya yeni minidump dosyalarını bırakıyorum.

@KojiroHyuga04

Babaannemin evindeyim bilgisayara erişimim yok, telefondan anca ne oluyor diye takip ediyorum. Maalesef yardımcı olamayacağım özür dilerim.

Hocam şöyle bırakayım elinden ne gelirse.

Kod:
Microsoft (R) Windows Debugger Version 10.0.21349.1004 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.

Loading Dump File [C:\Users\kadir\Desktop\061721-8437-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available

Symbol search path is: srv*
Executable search path is:
Windows 10 Kernel Version 19041 MP (6 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS
Edition build lab: 19041.1.amd64fre.vb_release.191206-1406
Machine Name:
Kernel base = 0xfffff805`77600000 PsLoadedModuleList = 0xfffff805`7822a230
Debug session time: Thu Jun 17 21:52:51.088 2021 (UTC + 3:00)
System Uptime: 0 days 0:21:32.736
Loading Kernel Symbols
...............................................................
................................................................
.................................................
Loading User Symbols
Loading unloaded module list
........
For analysis of this file, run !analyze -v
nt!KeBugCheckEx:
fffff805`779f6c20 48894c2408 mov qword ptr [rsp+8],rcx ss:0018:ffffaf81`aaa45560=000000000000000a
3: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************

IRQL_NOT_LESS_OR_EQUAL (a)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high. This is usually
caused by drivers using improper addresses.
If a kernel debugger is available get the stack backtrace.
Arguments:
Arg1: 0000000000000000, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000001, bitfield :
 bit 0 : value 0 = read operation, 1 = write operation
 bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
Arg4: fffff8057790a94d, address which referenced memory

Debugging Details:
------------------

*** WARNING: Unable to verify checksum for win32k.sys

KEY_VALUES_STRING: 1

 Key : Analysis.CPU.mSec
 Value: 4452

 Key : Analysis.DebugAnalysisManager
 Value: Create

 Key : Analysis.Elapsed.mSec
 Value: 8465

 Key : Analysis.Init.CPU.mSec
 Value: 296

 Key : Analysis.Init.Elapsed.mSec
 Value: 2592

 Key : Analysis.Memory.CommitPeak.Mb
 Value: 81

 Key : WER.OS.Branch
 Value: vb_release

 Key : WER.OS.Timestamp
 Value: 2019-12-06T14:06:00Z

 Key : WER.OS.Version
 Value: 10.0.19041.1

BUGCHECK_CODE: a

BUGCHECK_P1: 0

BUGCHECK_P2: 2

BUGCHECK_P3: 1

BUGCHECK_P4: fffff8057790a94d

WRITE_ADDRESS: fffff805782fb390: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
unable to get nt!MmSpecialPagesInUse
 0000000000000000

BLACKBOXBSD: 1 (!blackboxbsd)

BLACKBOXNTFS: 1 (!blackboxntfs)

BLACKBOXPNP: 1 (!blackboxpnp)

BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT: 1

PROCESS_NAME: System

TRAP_FRAME: ffffaf81aaa456a0 -- (.trap 0xffffaf81aaa456a0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000ffff7f rbx=0000000000000000 rcx=0000000000000005
rdx=0000000000000000 rsi=0000000000000000 rdi=0000000000000000
rip=fffff8057790a94d rsp=ffffaf81aaa45830 rbp=ffffdc0bd9843290
 r8=0000000000000102 r9=0000000000000000 r10=0000000000000000
r11=ffffaf81aaa458c0 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 ov up ei ng nz ac po nc
nt!KiTimerWaitTest+0x19d:
fffff805`7790a94d f02107 lock and dword ptr [rdi],eax ds:00000000`00000000=????????
Resetting default scope

STACK_TEXT:
ffffaf81`aaa45558 fffff805`77a08b69 : 00000000`0000000a 00000000`00000000 00000000`00000002 00000000`00000001 : nt!KeBugCheckEx
ffffaf81`aaa45560 fffff805`77a04e69 : 00000000`00000000 ffff9e81`e0200180 ffffdc0b`d94a0080 00000000`00000000 : nt!KiBugCheckDispatch+0x69
ffffaf81`aaa456a0 fffff805`7790a94d : ffffdc0b`d98431c8 ffffaf81`00000000 ffffdc0b`d9843290 00000000`00000000 : nt!KiPageFault+0x469
ffffaf81`aaa45830 fffff805`7790a53c : ffffdc0b`d98431c0 00000000`00000006 ffffaf81`aaa45b18 00000000`00000002 : nt!KiTimerWaitTest+0x19d
ffffaf81`aaa458e0 fffff805`7792279d : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`0000c0b9 : nt!KiProcessExpiredTimerList+0xdc
ffffaf81`aaa459d0 fffff805`779fa78e : ffffffff`00000000 ffff9e81`e0200180 ffff9e81`e020b1c0 ffffdc0b`d9f88080 : nt!KiRetireDpcList+0x5dd
ffffaf81`aaa45c60 00000000`00000000 : ffffaf81`aaa46000 ffffaf81`aaa40000 00000000`00000000 00000000`00000000 : nt!KiIdleLoop+0x9e

SYMBOL_NAME: nt!KiTimerWaitTest+19d

MODULE_NAME: nt

IMAGE_NAME: ntkrnlmp.exe

IMAGE_VERSION: 10.0.19041.1052

STACK_COMMAND: .thread ; .cxr ; kb

BUCKET_ID_FUNC_OFFSET: 19d

FAILURE_BUCKET_ID: AV_nt!KiTimerWaitTest

OS_VERSION: 10.0.19041.1

BUILDLAB_STR: vb_release

OSPLATFORM_TYPE: x64

OSNAME: Windows 10

FAILURE_ID_HASH: {8c029a8d-9f29-4bde-2664-6010a6365158}

Followup: MachineOwner
---------
 
Son düzenleyen: Moderatör:

Şu anda mobildeyim. Yarın bakabilirim.
Hocam şöyle bırakayım elinden ne gelirse.
Microsoft (r) Windows debugger version 10.0.21349.1004 AMD64.
Copyright (C) Microsoft corporation. All rights reserved.

Loading dump file [C:\Users\kadir\Desktop\061721-8437-01.dmp]
Mini kernel dump file: Only registers and stack trace are available.

Symbol Search path is: Srv*
Executable Search path is:
Windows 10 kernel version 19041 MP (6 procs) Free X64.
PROduct: Winnt, Suite: Terminalserver singleuserts.
Edition Build lab: 19041.1.AMD64fre. Vb_release. 191206-1406
Machine name:
Kernel base = 0xfffff805`77600000 psloadedmodulelist = 0xfffff805`7822a230
Debug session time: Thu jun 17 21:52:51.088 2021 (utc + 3:00)
System uptime: 0 days 0:21:32.736
Loading kernel symbols.



Loading user symbols.
Loading unloaded module list.

For analysis of this file, run! Analyze -v
NT! Kebugcheckex:
Fffff805'779F6C20 48894C2408 mov qword ptr [rsp+8],rcx SS:0018:ffffaf81'AAA45560 = 000000000000000A.
3: Kd>!analyze -v
*******************************************************************************
* *
* Bugcheck analysis *
* *
*******************************************************************************

IRQL_NOT_LESS_OR_EQUAL (a)
An attempt was made to Access'a pageable (or completely invalid) address at an.
İnterrupt request level (IRQL) that is too High. This is usually.
Caused by drivers using improper addresses.
If a kernel debugger is available GET the stack backtrace.
Arguments:
Arg1: 0000000000000000, Memory referenced.
Arg2: 0000000000000002, IRQL.
Arg3: 0000000000000001, bitfield:
Bit 0: Value 0 = read operation, 1 = write operation.
Bit 3: Value 0 = not an execute operation, 1 = execute operation (only on chips which Support this level of status)
Arg4: FffFF8057790A94D, address which referenced Memory.

Debugging details:
------------------

*** Warnıng: Unable to verify checksum for win32k.sys

Key_values_strıng: 1

Key: Analysis. CPU. Msec.
Value: 4452.

Key: Analysis. Debuganalysismanager.
Value: Create.

Key: Analysis. Elapsed. Msec.
Value: 8465.

Key: Analysis. Init. CPU. Msec.
Value: 296.

Key: Analysis. Init. Elapsed. Msec.
Value: 2592.

Key: Analysis. Memory.commitpeak. MB.
Value: 81.

Key: Wer. OS. Branch.
Value: Vb_release.

Key: Wer. OS. Timestamp.
Value: 2019-12-06t14:06:00Z

Key: Wer. OS. Version.
Value: 10.0.19041.1

Bugcheck_code: A

Bugcheck_p1: 0

Bugcheck_p2: 2

Bugcheck_p3: 1

Bugcheck_p4: FffFF8057790A94D.

Wrıte_address: FffFF805782fb390: Unable to GET mivisiblestate.
Unable to GET nonpagedpoolstart.
Unable to GET nonpagedpoolend.
Unable to GET pagedpoolstart.
Unable to GET pagedpoolend.
Unable to GET NT! Mmspecialpagesınuse.
0000000000000000.

Blackboxbsd: 1 (!blackboxbsd)

Blackboxntfs: 1 (!blackboxntfs)

Blackboxpnp: 1 (!blackboxpnp)

Blackboxwınlogon: 1

Customer_crash_count: 1

Process_name: System.

Trap_frame: FfffAF81AAA456a0 -- (.trap 0xffffaf81aaa456a0)
Note: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
Rax = 0000000000ffff7F rbx = 0000000000000000 rcx = 0000000000000005.
Rdx = 0000000000000000 rsi = 0000000000000000 rdi = 0000000000000000.
Rip = fffFF8057790A94D rsp = ffffAF81AAA45830 rbp = ffffdc0BD9843290.
R8 = 0000000000000102 R9 = 0000000000000000 R10 = 0000000000000000.
R11 = ffffAF81AAA458C0 R12 = 0000000000000000 R13 = 0000000000000000.
R14 = 0000000000000000 R15 = 0000000000000000.
İopl = 0 ov up ei ng nz AC po nc.
NT! Kitimerwaittest+0x19D:
Fffff805'7790A94D F02107 lock and dword ptr [rdi],eax DS: 00000000'00000000=?
Resetting default scope.

Stack_text:
Ffffaf81'AAA45558 fffff805'77a08b69: 00000000'0000000A 00000000'00000000 00000000'00000002 00000000'00000001: NT! Kebugcheckex.
Ffffaf81'AAA45560 fffff805'77a04e69: 00000000'00000000 ffff9e81'E0200180 ffffdc0b'D94a0080 00000000'00000000: NT! Kibugcheckdispatch+0x69
Ffffaf81'AAA456a0 fffff805'7790A94D: Ffffdc0b'D98431C8 ffffaf81'00000000 ffffdc0b'D9843290 00000000'00000000: NT! Kipagefault+0x469
Ffffaf81'AAA45830 fffff805'7790A53C: Ffffdc0b'D98431C0 00000000'00000006 ffffaf81'AAA45B18 00000000'00000002: NT! Kitimerwaittest+0x19D
Ffffaf81'AAA458e0 fffff805'7792279D: 00000000'00000000 00000000'00000000 00000000'00000000 00000000'0000C0B9: NT! Kiprocessexpiredtimerlist+0xdc
Ffffaf81'AAA459D0 fffff805'779fa78e: Ffffffff'00000000 ffff9e81'E0200180 ffff9e81'E020B1C0 ffffdc0b'D9F88080: NT! Kiretiredpclist+0x5dd
Ffffaf81'AAA45C60 00000000'00000000: Ffffaf81'AAA46000 ffffaf81'AAA40000 00000000'00000000 00000000'00000000: NT! Kiıdleloop+0x9E

Symbol_name: NT! Kitimerwaittest+19D

Module_name: NT.

Image_name: ntkrnlmp.exe

Image_versıon: 10.0.19041.1052

Stack_command: Thread. Cxr; KB.

Bucket_ıd_func_offset: 19D.

Faılure_bucket_ıd: Av_nt! Kitimerwaittest.

Os_versıon: 10.0.19041.1

Buıldlab_str: Vb_release.

Osplatform_type: X64.

Osname: Windows 10.

Faılure_ıd_hash: {8C029A8D-9F29-4BDE-2664-6010A6365158}

Followup: Machineowner.
---------

Buradan çıkarttığım kadarıyla;
Memtsst 86 ile RAM testi yapın.
 
Şu anda mobildeyim. Yarın bakabilirim.

Buradan çıkarttığım kadarıyla;
Memtsst 86 ile RAM testi yapın.

RAM'lerim ile alakası olduğunu sanmıyorum. Ben de bu işlerden gittikçe anlıyorum Windows'un kendi içindeki bir sorun buna neden oluyor ancak kodları okuyamadığımdan ne olduğunu bilmiyorum.
 
Son düzenleyen: Moderatör:
Artı -2 Eksi
Bellek testi yapın:


Kod:
KERNEL_SECURITY_CHECK_FAILURE (139)
A kernel component has corrupted a critical data structure.  The corruption
could potentially allow a malicious user to gain control of this machine.
Arguments:
Arg1: 0000000000000003, A LIST_ENTRY has been corrupted (i.e. double remove).
Arg2: fffffb099264cb20, Address of the trap frame for the exception that caused the BugCheck
Arg3: fffffb099264ca78, Address of the exception record for the exception that caused the BugCheck
Arg4: 0000000000000000, Reserved

Debugging Details:
------------------


KEY_VALUES_STRING: 1

    Key  : Analysis.CPU.mSec
    Value: 3249

    Key  : Analysis.DebugAnalysisManager
    Value: Create

    Key  : Analysis.Elapsed.mSec
    Value: 12935

    Key  : Analysis.Init.CPU.mSec
    Value: 546

    Key  : Analysis.Init.Elapsed.mSec
    Value: 16009

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 74

    Key  : FailFast.Name
    Value: CORRUPT_LIST_ENTRY

    Key  : FailFast.Type
    Value: 3

    Key  : WER.OS.Branch
    Value: vb_release

    Key  : WER.OS.Timestamp
    Value: 2019-12-06T14:06:00Z

    Key  : WER.OS.Version
    Value: 10.0.19041.1


BUGCHECK_CODE:  139

BUGCHECK_P1: 3

BUGCHECK_P2: fffffb099264cb20

BUGCHECK_P3: fffffb099264ca78

BUGCHECK_P4: 0

TRAP_FRAME:  fffffb099264cb20 -- (.trap 0xfffffb099264cb20)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=ffffb38fdb225490 rbx=0000000000000000 rcx=0000000000000003
rdx=ffffb38fde5fa1d0 rsi=0000000000000000 rdi=0000000000000000
rip=fffff8051f853017 rsp=fffffb099264ccb0 rbp=00000000000000c6
 r8=0000000000000000  r9=fffffb099264cda0 r10=fffff8051af96ac0
r11=000000c48b1b96f4 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0         nv up ei ng nz na po cy
nt!KiRemoveEntryTimer+0x18b417:
fffff805`1f853017 cd29            int     29h
Resetting default scope

EXCEPTION_RECORD:  fffffb099264ca78 -- (.exr 0xfffffb099264ca78)
ExceptionAddress: fffff8051f853017 (nt!KiRemoveEntryTimer+0x000000000018b417)
   ExceptionCode: c0000409 (Security check failure or stack buffer overrun)
  ExceptionFlags: 00000001
NumberParameters: 1
   Parameter[0]: 0000000000000003
Subcode: 0x3 FAST_FAIL_CORRUPT_LIST_ENTRY

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXPNP: 1 (!blackboxpnp)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  opera.exe

ERROR_CODE: (NTSTATUS) 0xc0000409 - Sistem, bu uygulamada y   n tabanl  bir arabelle in ta t   n  alg lad . Bu ta ma, k t  niyetli bir kullan c n n bu uygulaman n denetimini ele ge irmesine olanak verebilir.

EXCEPTION_CODE_STR:  c0000409

EXCEPTION_PARAMETER1:  0000000000000003

DPC_STACK_BASE:  FFFFFB099264CFB0

EXCEPTION_STR:  0xc0000409

STACK_TEXT: 
fffffb09`9264c7f8 fffff805`1f808b69     : 00000000`00000139 00000000`00000003 fffffb09`9264cb20 fffffb09`9264ca78 : nt!KeBugCheckEx
fffffb09`9264c800 fffff805`1f808f90     : 00000000`00000000 00000000`00000000 00000000`00000008 ffffa201`eb963180 : nt!KiBugCheckDispatch+0x69
fffffb09`9264c940 fffff805`1f807323     : 00000000`00400a02 00000000`00000000 00400a02`00000010 0000ad8f`5563e69f : nt!KiFastFailDispatch+0xd0
fffffb09`9264cb20 fffff805`1f853017     : 00000000`00000000 00000000`00000000 ffff4482`2c1fee30 0000ad8f`5563d187 : nt!KiRaiseSecurityCheckFailure+0x323
fffffb09`9264ccb0 fffff805`1f722b5e     : ffffa201`eb800180 4f8d481f`00000000 00000000`00000000 fffffb09`9264cda0 : nt!KiRemoveEntryTimer+0x18b417
fffffb09`9264cd20 fffff805`1f7fdc65     : 894cc845`7f0ff380 ffffa201`eb800180 ffffb38f`cbac6e60 00000000`000000a0 : nt!KiRetireDpcList+0x99e
fffffb09`9264cfb0 fffff805`1f7fda50     : fffff805`1f7f2d10 fffff805`1f6c656a 00000000`00000000 000027c0`01c82c80 : nt!KxRetireDpcList+0x5
fffffb09`9745eac0 fffff805`1f7fd305     : 00000000`000000a0 fffff805`1f7f8cb1 000027c4`06db8501 00000000`00000000 : nt!KiDispatchInterruptContinue
fffffb09`9745eaf0 fffff805`1f7f8cb1     : 000027c4`06db8501 00000000`00000000 00000000`00000000 ffffb38f`00000000 : nt!KiDpcInterruptBypass+0x25
fffffb09`9745eb00 00000000`00000000     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiInterruptDispatchNoLockNoEtw+0xb1


SYMBOL_NAME:  nt!KiRemoveEntryTimer+18b417

MODULE_NAME: nt

IMAGE_NAME:  ntkrnlmp.exe

IMAGE_VERSION:  10.0.19041.1052

STACK_COMMAND:  .thread ; .cxr ; kb

BUCKET_ID_FUNC_OFFSET:  18b417

FAILURE_BUCKET_ID:  0x139_3_CORRUPT_LIST_ENTRY_KTIMER_LIST_CORRUPTION_nt!KiRemoveEntryTimer

OS_VERSION:  10.0.19041.1

BUILDLAB_STR:  vb_release

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

FAILURE_ID_HASH:  {5cf1a79f-75db-1c81-82ec-116a11522249}

Followup:     MachineOwner
---------

DPC_WATCHDOG_VIOLATION (133)
The DPC watchdog detected a prolonged run time at an IRQL of DISPATCH_LEVEL
or above.
Arguments:
Arg1: 0000000000000001, The system cumulatively spent an extended period of time at
    DISPATCH_LEVEL or above. The offending component can usually be
    identified with a stack trace.
Arg2: 0000000000001e00, The watchdog period.
Arg3: fffff80138cfb320, cast to nt!DPC_WATCHDOG_GLOBAL_TRIAGE_BLOCK, which contains
    additional information regarding the cumulative timeout
Arg4: 0000000000000000

Debugging Details:
------------------

*************************************************************************
***                                                                   ***
***                                                                   ***
***    Either you specified an unqualified symbol, or your debugger   ***
***    doesn't have full symbol information.  Unqualified symbol      ***
***    resolution is turned off by default. Please either specify a   ***
***    fully qualified symbol module!symbolname, or enable resolution ***
***    of unqualified symbols by typing ".symopt- 100". Note that     ***
***    enabling unqualified symbol resolution with network symbol     ***
***    server shares in the symbol path may cause the debugger to     ***
***    appear to hang for long periods of time when an incorrect      ***
***    symbol name is typed or the network symbol server is down.     ***
***                                                                   ***
***    For some commands to work properly, your symbol path           ***
***    must point to .pdb files that have full type information.      ***
***                                                                   ***
***    Certain .pdb files (such as the public OS symbols) do not      ***
***    contain the required information.  Contact the group that      ***
***    provided you with these symbols if you need this command to    ***
***    work.                                                          ***
***                                                                   ***
***    Type referenced: TickPeriods                                   ***
***                                                                   ***
*************************************************************************

KEY_VALUES_STRING: 1

    Key  : Analysis.CPU.mSec
    Value: 4171

    Key  : Analysis.DebugAnalysisManager
    Value: Create

    Key  : Analysis.Elapsed.mSec
    Value: 42126

    Key  : Analysis.Init.CPU.mSec
    Value: 530

    Key  : Analysis.Init.Elapsed.mSec
    Value: 12770

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 78

    Key  : WER.OS.Branch
    Value: vb_release

    Key  : WER.OS.Timestamp
    Value: 2019-12-06T14:06:00Z

    Key  : WER.OS.Version
    Value: 10.0.19041.1


BUGCHECK_CODE:  133

BUGCHECK_P1: 1

BUGCHECK_P2: 1e00

BUGCHECK_P3: fffff80138cfb320

BUGCHECK_P4: 0

DPC_TIMEOUT_TYPE:  DPC_QUEUE_EXECUTION_TIMEOUT_EXCEEDED

TRAP_FRAME:  fffffe80133805b0 -- (.trap 0xfffffe80133805b0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=000000005d62aec1 rbx=0000000000000000 rcx=fffffe80133807a8
rdx=0000000000000001 rsi=0000000000000000 rdi=0000000000000000
rip=fffff80138309c27 rsp=fffffe8013380740 rbp=0000000000000000
 r8=0000000000000020  r9=0000000000000001 r10=0000000000000000
r11=fffff80138000000 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0         nv up ei pl nz na pe nc
nt!KeYieldProcessorEx+0x17:
fffff801`38309c27 4883c420        add     rsp,20h
Resetting default scope

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXPNP: 1 (!blackboxpnp)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  EpicGamesLauncher.exe

STACK_TEXT: 
ffffcf00`c0fb5e18 fffff801`3841edb6     : 00000000`00000133 00000000`00000001 00000000`00001e00 fffff801`38cfb320 : nt!KeBugCheckEx
ffffcf00`c0fb5e20 fffff801`38216ac3     : 00006d36`3e4a2721 ffffcf00`c0f63180 00000000`00000000 ffffcf00`c0f63180 : nt!KeAccumulateTicks+0x205a96
ffffcf00`c0fb5e80 fffff801`382165aa     : ffffb885`2c4ca600 fffffe80`13380630 00000000`00000000 00000000`00000000 : nt!KeClockInterruptNotify+0x453
ffffcf00`c0fb5f30 fffff801`3827e795     : ffffb885`2c4ca600 00000000`00000000 00000000`00000000 ffff4ce4`e7b993b6 : nt!HalpTimerClockIpiRoutine+0x1a
ffffcf00`c0fb5f60 fffff801`383f86ca     : fffffe80`13380630 ffffb885`2c4ca600 00000000`00000001 00000000`00000000 : nt!KiCallInterruptServiceRoutine+0xa5
ffffcf00`c0fb5fb0 fffff801`383f8c37     : fffffe80`133807a8 ffffb885`3a781180 ffffb885`2c4ca600 ffffb885`3a781180 : nt!KiInterruptSubDispatchNoLockNoEtw+0xfa
fffffe80`133805b0 fffff801`38309c27     : ffffffff`ffffffd2 fffff801`3820e3ec 00000000`00000010 00000000`00040286 : nt!KiInterruptDispatchNoLockNoEtw+0x37
fffffe80`13380740 fffff801`3820e3ea     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KeYieldProcessorEx+0x17
fffffe80`13380770 fffff801`3820cb3c     : ffffcf00`00000006 00000000`00000000 0000004d`00000000 00000000`00000000 : nt!KiCancelTimer+0x37a
fffffe80`13380820 fffff801`3820be9f     : ffffb885`3a781080 00000000`00000000 fffffe80`133809e0 ffffcf00`c0c80100 : nt!KiSwapThread+0x6cc
fffffe80`133808d0 fffff801`3820b743     : ffffcf00`00000016 fffff801`00000000 000f8067`b4bbbd01 ffffb885`3a7811c0 : nt!KiCommitThreadWait+0x14f
fffffe80`13380970 fffff801`385f7551     : ffffb885`3a670a60 00000000`00000006 00000000`00000001 00000000`00000000 : nt!KeWaitForSingleObject+0x233
fffffe80`13380a60 fffff801`385f75fa     : ffffb885`3a781080 000000bd`629ffb48 00000000`00000000 00000000`00000000 : nt!ObWaitForSingleObject+0x91
fffffe80`13380ac0 fffff801`384085b8     : 00000000`00000000 00000000`00000000 fffffe80`13380b18 ffffffff`fffe7960 : nt!NtWaitForSingleObject+0x6a
fffffe80`13380b00 00007ffe`089ecea4     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x28
000000bd`629ffb18 00000000`00000000     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffe`089ecea4


SYMBOL_NAME:  nt!KeAccumulateTicks+205a96

MODULE_NAME: nt

IMAGE_NAME:  ntkrnlmp.exe

IMAGE_VERSION:  10.0.19041.1052

STACK_COMMAND:  .thread ; .cxr ; kb

BUCKET_ID_FUNC_OFFSET:  205a96

FAILURE_BUCKET_ID:  0x133_ISR_nt!KeAccumulateTicks

OS_VERSION:  10.0.19041.1

BUILDLAB_STR:  vb_release

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

FAILURE_ID_HASH:  {65350307-c3b9-f4b5-8829-4d27e9ff9b06}

Followup:     MachineOwner
---------

DPC_WATCHDOG_VIOLATION (133)
The DPC watchdog detected a prolonged run time at an IRQL of DISPATCH_LEVEL
or above.
Arguments:
Arg1: 0000000000000001, The system cumulatively spent an extended period of time at
    DISPATCH_LEVEL or above. The offending component can usually be
    identified with a stack trace.
Arg2: 0000000000001e00, The watchdog period.
Arg3: fffff8037aefb320, cast to nt!DPC_WATCHDOG_GLOBAL_TRIAGE_BLOCK, which contains
    additional information regarding the cumulative timeout
Arg4: 0000000000000000

Debugging Details:
------------------

*************************************************************************
***                                                                   ***
***                                                                   ***
***    Either you specified an unqualified symbol, or your debugger   ***
***    doesn't have full symbol information.  Unqualified symbol      ***
***    resolution is turned off by default. Please either specify a   ***
***    fully qualified symbol module!symbolname, or enable resolution ***
***    of unqualified symbols by typing ".symopt- 100". Note that     ***
***    enabling unqualified symbol resolution with network symbol     ***
***    server shares in the symbol path may cause the debugger to     ***
***    appear to hang for long periods of time when an incorrect      ***
***    symbol name is typed or the network symbol server is down.     ***
***                                                                   ***
***    For some commands to work properly, your symbol path           ***
***    must point to .pdb files that have full type information.      ***
***                                                                   ***
***    Certain .pdb files (such as the public OS symbols) do not      ***
***    contain the required information.  Contact the group that      ***
***    provided you with these symbols if you need this command to    ***
***    work.                                                          ***
***                                                                   ***
***    Type referenced: TickPeriods                                   ***
***                                                                   ***
*************************************************************************

KEY_VALUES_STRING: 1

    Key  : Analysis.CPU.mSec
    Value: 4280

    Key  : Analysis.DebugAnalysisManager
    Value: Create

    Key  : Analysis.Elapsed.mSec
    Value: 16476

    Key  : Analysis.Init.CPU.mSec
    Value: 437

    Key  : Analysis.Init.Elapsed.mSec
    Value: 12628

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 77

    Key  : WER.OS.Branch
    Value: vb_release

    Key  : WER.OS.Timestamp
    Value: 2019-12-06T14:06:00Z

    Key  : WER.OS.Version
    Value: 10.0.19041.1


BUGCHECK_CODE:  133

BUGCHECK_P1: 1

BUGCHECK_P2: 1e00

BUGCHECK_P3: fffff8037aefb320

BUGCHECK_P4: 0

DPC_TIMEOUT_TYPE:  DPC_QUEUE_EXECUTION_TIMEOUT_EXCEEDED

TRAP_FRAME:  ffff8804f0f9c680 -- (.trap 0xffff8804f0f9c680)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=000000005d67ea62 rbx=0000000000000000 rcx=ffff8804f0f9c878
rdx=0000000000000001 rsi=0000000000000000 rdi=0000000000000000
rip=fffff8037a509c27 rsp=ffff8804f0f9c810 rbp=0000000000000000
 r8=0000000100000050  r9=ffff8c011ab63180 r10=0000000000000000
r11=fffff8037a200000 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0         nv up ei pl nz na pe nc
nt!KeYieldProcessorEx+0x17:
fffff803`7a509c27 4883c420        add     rsp,20h
Resetting default scope

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXPNP: 1 (!blackboxpnp)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  Tra

STACK_TEXT: 
ffff8c01`1abb5e18 fffff803`7a61edb6     : 00000000`00000133 00000000`00000001 00000000`00001e00 fffff803`7aefb320 : nt!KeBugCheckEx
ffff8c01`1abb5e20 fffff803`7a416ac3     : 00006f42`a88139b4 ffff8c01`1ab63180 00000000`00000000 ffff8c01`1ab63180 : nt!KeAccumulateTicks+0x205a96
ffff8c01`1abb5e80 fffff803`7a4165aa     : ffffd48b`6dac9600 ffff8804`f0f9c700 00000000`00000000 00000000`00000000 : nt!KeClockInterruptNotify+0x453
ffff8c01`1abb5f30 fffff803`7a47e795     : ffffd48b`6dac9600 00000000`00000000 00000000`00000000 ffff3da8`510516ca : nt!HalpTimerClockIpiRoutine+0x1a
ffff8c01`1abb5f60 fffff803`7a5f86ca     : ffff8804`f0f9c700 ffffd48b`6dac9600 00000000`00000001 00000000`00000000 : nt!KiCallInterruptServiceRoutine+0xa5
ffff8c01`1abb5fb0 fffff803`7a5f8c37     : ffff8804`f0f9c878 ffffd48b`864ca180 00000000`00000082 fffff803`7a5f8cc4 : nt!KiInterruptSubDispatchNoLockNoEtw+0xfa
ffff8804`f0f9c680 fffff803`7a509c27     : 00000000`00000010 00000000`00040286 ffff8804`f0f9c838 00000000`00000018 : nt!KiInterruptDispatchNoLockNoEtw+0x37
ffff8804`f0f9c810 fffff803`7a40e3ea     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KeYieldProcessorEx+0x17
ffff8804`f0f9c840 fffff803`7a40cb3c     : ffff8c01`1aaa8180 00000000`00000000 ffffd48b`864ca080 00000000`00000000 : nt!KiCancelTimer+0x37a
ffff8804`f0f9c8f0 fffff803`7a40be9f     : ffffd48b`00000004 fffff803`00000000 00000000`00000000 00000000`00000000 : nt!KiSwapThread+0x6cc
ffff8804`f0f9c9a0 fffff803`7a544f82     : 00000000`000000d2 00000000`00000000 ffffd48b`00000001 00000000`77754660 : nt!KiCommitThreadWait+0x14f
ffff8804`f0f9ca40 fffff803`7a90408f     : 00000000`00fca000 ffffd48b`864ca080 00000000`00000000 00000000`00000002 : nt!KeDelayExecutionThread+0x122
ffff8804`f0f9cad0 fffff803`7a6085b8     : 00000000`00000029 00000000`00000000 ffffffff`fffe7960 00000000`00000000 : nt!NtDelayExecution+0x5f
ffff8804`f0f9cb00 00000000`77751cfc     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x28
00000000`03e3ee68 00000000`00000000     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x77751cfc


SYMBOL_NAME:  nt!KeAccumulateTicks+205a96

MODULE_NAME: nt

IMAGE_NAME:  ntkrnlmp.exe

IMAGE_VERSION:  10.0.19041.1052

STACK_COMMAND:  .thread ; .cxr ; kb

BUCKET_ID_FUNC_OFFSET:  205a96

FAILURE_BUCKET_ID:  0x133_ISR_nt!KeAccumulateTicks

OS_VERSION:  10.0.19041.1

BUILDLAB_STR:  vb_release

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

FAILURE_ID_HASH:  {65350307-c3b9-f4b5-8829-4d27e9ff9b06}

Followup:     MachineOwner
---------


TIMER_OR_DPC_INVALID (c7)
Kernel timer or DPC used incorrectly.
Arguments:
Arg1: 0000000000000008, A concurrent expiration attempt was detected.
Arg2: 0000000000000001, Concurrent single timer expiration attempt.
Arg3: ffffa201b062d180, Address of the current timer object.
Arg4: ffffa201a9bf9180, Address of the previous timer object.

Debugging Details:
------------------

*** WARNING: Unable to verify checksum for win32k.sys

KEY_VALUES_STRING: 1

    Key  : Analysis.CPU.mSec
    Value: 3593

    Key  : Analysis.DebugAnalysisManager
    Value: Create

    Key  : Analysis.Elapsed.mSec
    Value: 26629

    Key  : Analysis.Init.CPU.mSec
    Value: 436

    Key  : Analysis.Init.Elapsed.mSec
    Value: 13804

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 78

    Key  : WER.OS.Branch
    Value: vb_release

    Key  : WER.OS.Timestamp
    Value: 2019-12-06T14:06:00Z

    Key  : WER.OS.Version
    Value: 10.0.19041.1


BUGCHECK_CODE:  c7

BUGCHECK_P1: 8

BUGCHECK_P2: 1

BUGCHECK_P3: ffffa201b062d180

BUGCHECK_P4: ffffa201a9bf9180

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXPNP: 1 (!blackboxpnp)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  System

STACK_TEXT: 
ffffd00c`88c459c8 fffff801`6d486068     : 00000000`000000c7 00000000`00000008 00000000`00000001 ffffa201`b062d180 : nt!KeBugCheckEx
ffffd00c`88c459d0 fffff801`6d3fa78e     : ffffffff`00000000 ffffd200`09c00180 ffffd200`09c0b1c0 ffffa201`a04d4040 : nt!KiRetireDpcList+0x163ea8
ffffd00c`88c45c60 00000000`00000000     : ffffd00c`88c46000 ffffd00c`88c40000 00000000`00000000 00000000`00000000 : nt!KiIdleLoop+0x9e


SYMBOL_NAME:  nt!KiRetireDpcList+163ea8

MODULE_NAME: nt

IMAGE_NAME:  ntkrnlmp.exe

IMAGE_VERSION:  10.0.19041.1052

STACK_COMMAND:  .thread ; .cxr ; kb

BUCKET_ID_FUNC_OFFSET:  163ea8

FAILURE_BUCKET_ID:  0xC7_nt!KiRetireDpcList

OS_VERSION:  10.0.19041.1

BUILDLAB_STR:  vb_release

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

FAILURE_ID_HASH:  {f7b92172-f6ee-d2bd-e41c-a80e80f6c06c}

Followup:     MachineOwner
---------

3: kd> !sysinfo machineid
Machine ID Information [From Smbios 3.3, DMIVersion 0, Size=2256]
BiosMajorRelease = 5
BiosMinorRelease = 17
BiosVendor = American Megatrends Inc.
BiosVersion = 3002
BiosReleaseDate = 03/10/2021
SystemManufacturer = System manufacturer
SystemProductName = MODART-PC-MA1-V6
SystemFamily = To be filled by O.E.M.
SystemVersion = System Version
SystemSKU = SKU
BaseBoardManufacturer = ASUSTeK COMPUTER INC.
BaseBoardProduct = B450M-DRAGON
BaseBoardVersion = Rev X.0x
 

Geri
Yukarı