Monster Abra A5 v17.3 "DPC_WATCHDOG_VIOLATION" hatası

İşletim sistemi
Windows 10

Kenshinn0

Hectopat
Katılım
10 Aralık 2021
Mesajlar
4
Daha fazla  
Cinsiyet
Erkek
RAM
16
Ekran kartı
RTX 3050 Ti
İşlemci
i7-11800H
Merhabalar, yeni almış olduğum laptopum haftada 4-5 kere mavi ekran hatası vermektedir. Spotify'da müzik dinlerken ya da oyun oynarken, fark etmiyor.
Monster Abra A5 v17.3
tp.rar

Kod:
Microsoft (R) Windows Debugger Version 10.0.22473.1005 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.


Loading Dump File [C:\Users\ULA~1\AppData\Local\Temp\Rar$DIa0.050\121021-12781-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available


************* Path validation summary **************
Response                         Time (ms)     Location
Deferred                                       srv*
Symbol search path is: srv*
Executable search path is:
Windows 10 Kernel Version 19041 MP (16 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS
Edition build lab: 19041.1.amd64fre.vb_release.191206-1406
Machine Name:
Kernel base = 0xfffff802`58400000 PsLoadedModuleList = 0xfffff802`5902a2d0
Debug session time: Fri Dec 10 23:30:03.249 2021 (UTC + 3:00)
System Uptime: 0 days 4:56:55.001
Loading Kernel Symbols
...............................................................
................................................................
................................................................
...............
Loading User Symbols
Loading unloaded module list
...................
For analysis of this file, run !analyze -v
nt!KeBugCheckEx:
fffff802`587f72a0 48894c2408      mov     qword ptr [rsp+8],rcx ss:0018:ffffa300`239ffe20=0000000000000133
2: kd> !analyze -v
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

DPC_WATCHDOG_VIOLATION (133)
The DPC watchdog detected a prolonged run time at an IRQL of DISPATCH_LEVEL
or above.
Arguments:
Arg1: 0000000000000001, The system cumulatively spent an extended period of time at
    DISPATCH_LEVEL or above. The offending component can usually be
    identified with a stack trace.
Arg2: 0000000000001e00, The watchdog period.
Arg3: fffff802590fb320, cast to nt!DPC_WATCHDOG_GLOBAL_TRIAGE_BLOCK, which contains
    additional information regarding the cumulative timeout
Arg4: 0000000000000000

Debugging Details:
------------------

*** WARNING: Unable to verify timestamp for bhtsddr.sys
*************************************************************************
***                                                                   ***
***                                                                   ***
***    Either you specified an unqualified symbol, or your debugger   ***
***    doesn't have full symbol information.  Unqualified symbol      ***
***    resolution is turned off by default. Please either specify a   ***
***    fully qualified symbol module!symbolname, or enable resolution ***
***    of unqualified symbols by typing ".symopt- 100". Note that     ***
***    enabling unqualified symbol resolution with network symbol     ***
***    server shares in the symbol path may cause the debugger to     ***
***    appear to hang for long periods of time when an incorrect      ***
***    symbol name is typed or the network symbol server is down.     ***
***                                                                   ***
***    For some commands to work properly, your symbol path           ***
***    must point to .pdb files that have full type information.      ***
***                                                                   ***
***    Certain .pdb files (such as the public OS symbols) do not      ***
***    contain the required information.  Contact the group that      ***
***    provided you with these symbols if you need this command to    ***
***    work.                                                          ***
***                                                                   ***
***    Type referenced: TickPeriods                                   ***
***                                                                   ***
*************************************************************************
*** WARNING: Unable to verify timestamp for win32k.sys

KEY_VALUES_STRING: 1

    Key  : Analysis.CPU.mSec
    Value: 2031

    Key  : Analysis.DebugAnalysisManager
    Value: Create

    Key  : Analysis.Elapsed.mSec
    Value: 16358

    Key  : Analysis.Init.CPU.mSec
    Value: 311

    Key  : Analysis.Init.Elapsed.mSec
    Value: 3251

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 74

    Key  : WER.OS.Branch
    Value: vb_release

    Key  : WER.OS.Timestamp
    Value: 2019-12-06T14:06:00Z

    Key  : WER.OS.Version
    Value: 10.0.19041.1


FILE_IN_CAB:  121021-12781-01.dmp

BUGCHECK_CODE:  133

BUGCHECK_P1: 1

BUGCHECK_P2: 1e00

BUGCHECK_P3: fffff802590fb320

BUGCHECK_P4: 0

DPC_TIMEOUT_TYPE:  DPC_QUEUE_EXECUTION_TIMEOUT_EXCEEDED

TRAP_FRAME:  ffff880fbd7aeae0 -- (.trap 0xffff880fbd7aeae0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=ffffa30024753000 rbx=0000000000000000 rcx=0000000000000000
rdx=00000000000001cc rsi=0000000000000000 rdi=0000000000000000
rip=fffff8025c185f87 rsp=ffff880fbd7aec70 rbp=0000000000000001
 r8=0000000000000008  r9=0000000000000065 r10=fffff80258763170
r11=ffff880fbd7aec40 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0         nv up ei ng nz na po nc
bhtsddr+0x15f87:
fffff802`5c185f87 8b442430        mov     eax,dword ptr [rsp+30h] ss:0018:ffff880f`bd7aeca0=00000120
Resetting default scope

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXPNP: 1 (!blackboxpnp)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  System

STACK_TEXT:
ffffa300`239ffe18 fffff802`5881f67e     : 00000000`00000133 00000000`00000001 00000000`00001e00 fffff802`590fb320 : nt!KeBugCheckEx
ffffa300`239ffe20 fffff802`58616953     : 00001a2a`390caac2 ffffa300`239a9180 00000000`00000000 ffffa300`239a9180 : nt!KeAccumulateTicks+0x2064ce
ffffa300`239ffe80 fffff802`5861643a     : ffffba86`0f5030e0 ffff880f`bd7aeb60 00000000`00000000 00000000`00000000 : nt!KeClockInterruptNotify+0x453
ffffa300`239fff30 fffff802`586de055     : ffffba86`0f5030e0 fffff802`58752447 00000000`00000000 00000000`00000000 : nt!HalpTimerClockIpiRoutine+0x1a
ffffa300`239fff60 fffff802`587f8d4a     : ffff880f`bd7aeb60 ffffba86`0f5030e0 00000000`00000000 00000000`00000000 : nt!KiCallInterruptServiceRoutine+0xa5
ffffa300`239fffb0 fffff802`587f92b7     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiInterruptSubDispatchNoLockNoEtw+0xfa
ffff880f`bd7aeae0 fffff802`5c185f87     : 00000000`00000000 00000000`00000001 00000000`00000000 00000000`00000014 : nt!KiInterruptDispatchNoLockNoEtw+0x37
ffff880f`bd7aec70 00000000`00000000     : 00000000`00000001 00000000`00000000 00000000`00000014 00000000`0000a554 : bhtsddr+0x15f87


SYMBOL_NAME:  bhtsddr+15f87

MODULE_NAME: bhtsddr

IMAGE_NAME:  bhtsddr.sys

STACK_COMMAND:  .cxr; .ecxr ; kb

BUCKET_ID_FUNC_OFFSET:  15f87

FAILURE_BUCKET_ID:  0x133_ISR_bhtsddr!unknown_function

OS_VERSION:  10.0.19041.1

BUILDLAB_STR:  vb_release

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

FAILURE_ID_HASH:  {901d7f27-c8b9-1db7-6528-a08b6daeeb97}

Followup:     MachineOwner
---------
 
Son düzenleyen: Moderatör:
Yeni oluşan minidump dosyasını paylaşır mısınız?

Bütün driverları yeniden kurup DDU ile temiz kurulum da yapmıştım fakat düzelmedi.
Kod:
Microsoft (R) Windows Debugger Version 10.0.22473.1005 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.


Loading Dump File [C:\Users\ULAŞ\Desktop\121321-13281-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available


************* Path validation summary **************
Response                         Time (ms)     Location
Deferred                                       srv*
Symbol search path is: srv*
Executable search path is:
Windows 10 Kernel Version 19041 MP (16 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS
Edition build lab: 19041.1.amd64fre.vb_release.191206-1406
Machine Name:
Kernel base = 0xfffff803`56400000 PsLoadedModuleList = 0xfffff803`5702a2d0
Debug session time: Mon Dec 13 14:37:16.264 2021 (UTC + 3:00)
System Uptime: 1 days 20:42:32.625
Loading Kernel Symbols
...............................................................
................................................................
................................................................
..............
Loading User Symbols
Loading unloaded module list
............................................
For analysis of this file, run !analyze -v
nt!KeBugCheckEx:
fffff803`567f72a0 48894c2408      mov     qword ptr [rsp+8],rcx ss:0018:ffff9d81`1e67fe20=0000000000000133
3: kd> !analyze -v
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

DPC_WATCHDOG_VIOLATION (133)
The DPC watchdog detected a prolonged run time at an IRQL of DISPATCH_LEVEL
or above.
Arguments:
Arg1: 0000000000000001, The system cumulatively spent an extended period of time at
    DISPATCH_LEVEL or above. The offending component can usually be
    identified with a stack trace.
Arg2: 0000000000001e00, The watchdog period.
Arg3: fffff803570fb320, cast to nt!DPC_WATCHDOG_GLOBAL_TRIAGE_BLOCK, which contains
    additional information regarding the cumulative timeout
Arg4: 0000000000000000

Debugging Details:
------------------

*** WARNING: Unable to verify timestamp for bhtsddr.sys
*************************************************************************
***                                                                   ***
***                                                                   ***
***    Either you specified an unqualified symbol, or your debugger   ***
***    doesn't have full symbol information.  Unqualified symbol      ***
***    resolution is turned off by default. Please either specify a   ***
***    fully qualified symbol module!symbolname, or enable resolution ***
***    of unqualified symbols by typing ".symopt- 100". Note that     ***
***    enabling unqualified symbol resolution with network symbol     ***
***    server shares in the symbol path may cause the debugger to     ***
***    appear to hang for long periods of time when an incorrect      ***
***    symbol name is typed or the network symbol server is down.     ***
***                                                                   ***
***    For some commands to work properly, your symbol path           ***
***    must point to .pdb files that have full type information.      ***
***                                                                   ***
***    Certain .pdb files (such as the public OS symbols) do not      ***
***    contain the required information.  Contact the group that      ***
***    provided you with these symbols if you need this command to    ***
***    work.                                                          ***
***                                                                   ***
***    Type referenced: TickPeriods                                   ***
***                                                                   ***
*************************************************************************
*** WARNING: Unable to verify checksum for win32k.sys

KEY_VALUES_STRING: 1

    Key  : Analysis.CPU.mSec
    Value: 3655

    Key  : Analysis.DebugAnalysisManager
    Value: Create

    Key  : Analysis.Elapsed.mSec
    Value: 7806

    Key  : Analysis.Init.CPU.mSec
    Value: 343

    Key  : Analysis.Init.Elapsed.mSec
    Value: 2607

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 85

    Key  : WER.OS.Branch
    Value: vb_release

    Key  : WER.OS.Timestamp
    Value: 2019-12-06T14:06:00Z

    Key  : WER.OS.Version
    Value: 10.0.19041.1


FILE_IN_CAB:  121321-13281-01.dmp

BUGCHECK_CODE:  133

BUGCHECK_P1: 1

BUGCHECK_P2: 1e00

BUGCHECK_P3: fffff803570fb320

BUGCHECK_P4: 0

DPC_TIMEOUT_TYPE:  DPC_QUEUE_EXECUTION_TIMEOUT_EXCEEDED

TRAP_FRAME:  ffff828a79e31a50 -- (.trap 0xffff828a79e31a50)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000000 rbx=0000000000000000 rcx=fffff7c140001000
rdx=00009ce900000000 rsi=0000000000000000 rdi=0000000000000000
rip=fffff8035661f560 rsp=ffff828a79e31be8 rbp=000000000000b401
 r8=0000000000000008  r9=0000000000000065 r10=fffff80356763170
r11=0000000000000000 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0         nv up ei pl zr na po nc
nt!HalpTimerGetInternalData:
fffff803`5661f560 f781e000000000000100 test dword ptr [rcx+0E0h],10000h ds:fffff7c1`400010e0=01000007
Resetting default scope

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXPNP: 1 (!blackboxpnp)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  System

STACK_TEXT: 
ffff9d81`1e67fe18 fffff803`5681f67e     : 00000000`00000133 00000000`00000001 00000000`00001e00 fffff803`570fb320 : nt!KeBugCheckEx
ffff9d81`1e67fe20 fffff803`56616953     : 00009ce9`190aa76e ffff9d81`1e3eb180 00000000`00000000 ffff9d81`1e3eb180 : nt!KeAccumulateTicks+0x2064ce
ffff9d81`1e67fe80 fffff803`5661643a     : ffffc304`d26e7d40 ffff828a`79e31ad0 00000000`00000000 00000000`00000000 : nt!KeClockInterruptNotify+0x453
ffff9d81`1e67ff30 fffff803`566de055     : ffffc304`d26e7d40 00000000`00000000 00000000`00000000 ffff12b8`f8729a77 : nt!HalpTimerClockIpiRoutine+0x1a
ffff9d81`1e67ff60 fffff803`567f8d4a     : ffff828a`79e31ad0 ffffc304`d26e7d40 00000000`00000001 00000000`00000000 : nt!KiCallInterruptServiceRoutine+0xa5
ffff9d81`1e67ffb0 fffff803`567f92b7     : 00000000`00000087 fffff803`567f933f 00000000`00000010 00000000`00000000 : nt!KiInterruptSubDispatchNoLockNoEtw+0xfa
ffff828a`79e31a50 fffff803`5661f560     : fffff803`5661f4c4 fffff803`5704ee00 fffff803`5661b3a5 fffff803`5704ee00 : nt!KiInterruptDispatchNoLockNoEtw+0x37
ffff828a`79e31be8 fffff803`5661f4c4     : fffff803`5704ee00 fffff803`5661b3a5 fffff803`5704ee00 fffff803`5661c047 : nt!HalpTimerGetInternalData
ffff828a`79e31bf0 fffff803`5a185cc6     : 00000000`000003d3 00000000`00000001 00000000`00000000 00000000`00000014 : nt!KeStallExecutionProcessor+0x114
ffff828a`79e31c70 00000000`000003d3     : 00000000`00000001 00000000`00000000 00000000`00000014 00000000`0000a553 : bhtsddr+0x15cc6
ffff828a`79e31c78 00000000`00000001     : 00000000`00000000 00000000`00000014 00000000`0000a553 fffff803`5a179b9d : 0x3d3
ffff828a`79e31c80 00000000`00000000     : 00000000`00000014 00000000`0000a553 fffff803`5a179b9d ffffc304`d4439020 : 0x1


SYMBOL_NAME:  bhtsddr+15cc6

MODULE_NAME: bhtsddr

IMAGE_NAME:  bhtsddr.sys

STACK_COMMAND:  .cxr; .ecxr ; kb

BUCKET_ID_FUNC_OFFSET:  15cc6

FAILURE_BUCKET_ID:  0x133_ISR_bhtsddr!unknown_function

OS_VERSION:  10.0.19041.1

BUILDLAB_STR:  vb_release

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

FAILURE_ID_HASH:  {901d7f27-c8b9-1db7-6528-a08b6daeeb97}

Followup:     MachineOwner
---------
 
Dump dosyasını atın demiştim, çıktısını değil. Lütfen minidump dosyasını Drive'a yükleyip bizimle paylaşın.
 

Technopat Haberler

Yeni konular

Geri
Yukarı