Monster Abra A5 v17.3 "DPC_WATCHDOG_VIOLATION" hatası

İşletim sistemi
Windows 10

Kenshinn0

Hectopat
Katılım
10 Aralık 2021
Mesajlar
4
Daha fazla  
Cinsiyet
Erkek
RAM
16
Ekran kartı
RTX 3050 Ti
İşlemci
i7-11800H
Merhabalar, yeni almış olduğum laptopum haftada 4-5 kere mavi ekran hatası vermektedir. Spotify'da müzik dinlerken ya da oyun oynarken, fark etmiyor.
Monster Abra A5 v17.3
tp.rar

Kod:
Microsoft (R) Windows Debugger Version 10.0.22473.1005 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.


Loading Dump File [C:\Users\ULA~1\AppData\Local\Temp\Rar$DIa0.050\121021-12781-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available


************* Path validation summary **************
Response                         Time (ms)     Location
Deferred                                       srv*
Symbol search path is: srv*
Executable search path is:
Windows 10 Kernel Version 19041 MP (16 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS
Edition build lab: 19041.1.amd64fre.vb_release.191206-1406
Machine Name:
Kernel base = 0xfffff802`58400000 PsLoadedModuleList = 0xfffff802`5902a2d0
Debug session time: Fri Dec 10 23:30:03.249 2021 (UTC + 3:00)
System Uptime: 0 days 4:56:55.001
Loading Kernel Symbols
...............................................................
................................................................
................................................................
...............
Loading User Symbols
Loading unloaded module list
...................
For analysis of this file, run !analyze -v
nt!KeBugCheckEx:
fffff802`587f72a0 48894c2408      mov     qword ptr [rsp+8],rcx ss:0018:ffffa300`239ffe20=0000000000000133
2: kd> !analyze -v
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

DPC_WATCHDOG_VIOLATION (133)
The DPC watchdog detected a prolonged run time at an IRQL of DISPATCH_LEVEL
or above.
Arguments:
Arg1: 0000000000000001, The system cumulatively spent an extended period of time at
    DISPATCH_LEVEL or above. The offending component can usually be
    identified with a stack trace.
Arg2: 0000000000001e00, The watchdog period.
Arg3: fffff802590fb320, cast to nt!DPC_WATCHDOG_GLOBAL_TRIAGE_BLOCK, which contains
    additional information regarding the cumulative timeout
Arg4: 0000000000000000

Debugging Details:
------------------

*** WARNING: Unable to verify timestamp for bhtsddr.sys
*************************************************************************
***                                                                   ***
***                                                                   ***
***    Either you specified an unqualified symbol, or your debugger   ***
***    doesn't have full symbol information.  Unqualified symbol      ***
***    resolution is turned off by default. Please either specify a   ***
***    fully qualified symbol module!symbolname, or enable resolution ***
***    of unqualified symbols by typing ".symopt- 100". Note that     ***
***    enabling unqualified symbol resolution with network symbol     ***
***    server shares in the symbol path may cause the debugger to     ***
***    appear to hang for long periods of time when an incorrect      ***
***    symbol name is typed or the network symbol server is down.     ***
***                                                                   ***
***    For some commands to work properly, your symbol path           ***
***    must point to .pdb files that have full type information.      ***
***                                                                   ***
***    Certain .pdb files (such as the public OS symbols) do not      ***
***    contain the required information.  Contact the group that      ***
***    provided you with these symbols if you need this command to    ***
***    work.                                                          ***
***                                                                   ***
***    Type referenced: TickPeriods                                   ***
***                                                                   ***
*************************************************************************
*** WARNING: Unable to verify timestamp for win32k.sys

KEY_VALUES_STRING: 1

    Key  : Analysis.CPU.mSec
    Value: 2031

    Key  : Analysis.DebugAnalysisManager
    Value: Create

    Key  : Analysis.Elapsed.mSec
    Value: 16358

    Key  : Analysis.Init.CPU.mSec
    Value: 311

    Key  : Analysis.Init.Elapsed.mSec
    Value: 3251

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 74

    Key  : WER.OS.Branch
    Value: vb_release

    Key  : WER.OS.Timestamp
    Value: 2019-12-06T14:06:00Z

    Key  : WER.OS.Version
    Value: 10.0.19041.1


FILE_IN_CAB:  121021-12781-01.dmp

BUGCHECK_CODE:  133

BUGCHECK_P1: 1

BUGCHECK_P2: 1e00

BUGCHECK_P3: fffff802590fb320

BUGCHECK_P4: 0

DPC_TIMEOUT_TYPE:  DPC_QUEUE_EXECUTION_TIMEOUT_EXCEEDED

TRAP_FRAME:  ffff880fbd7aeae0 -- (.trap 0xffff880fbd7aeae0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=ffffa30024753000 rbx=0000000000000000 rcx=0000000000000000
rdx=00000000000001cc rsi=0000000000000000 rdi=0000000000000000
rip=fffff8025c185f87 rsp=ffff880fbd7aec70 rbp=0000000000000001
 r8=0000000000000008  r9=0000000000000065 r10=fffff80258763170
r11=ffff880fbd7aec40 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0         nv up ei ng nz na po nc
bhtsddr+0x15f87:
fffff802`5c185f87 8b442430        mov     eax,dword ptr [rsp+30h] ss:0018:ffff880f`bd7aeca0=00000120
Resetting default scope

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXPNP: 1 (!blackboxpnp)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  System

STACK_TEXT:
ffffa300`239ffe18 fffff802`5881f67e     : 00000000`00000133 00000000`00000001 00000000`00001e00 fffff802`590fb320 : nt!KeBugCheckEx
ffffa300`239ffe20 fffff802`58616953     : 00001a2a`390caac2 ffffa300`239a9180 00000000`00000000 ffffa300`239a9180 : nt!KeAccumulateTicks+0x2064ce
ffffa300`239ffe80 fffff802`5861643a     : ffffba86`0f5030e0 ffff880f`bd7aeb60 00000000`00000000 00000000`00000000 : nt!KeClockInterruptNotify+0x453
ffffa300`239fff30 fffff802`586de055     : ffffba86`0f5030e0 fffff802`58752447 00000000`00000000 00000000`00000000 : nt!HalpTimerClockIpiRoutine+0x1a
ffffa300`239fff60 fffff802`587f8d4a     : ffff880f`bd7aeb60 ffffba86`0f5030e0 00000000`00000000 00000000`00000000 : nt!KiCallInterruptServiceRoutine+0xa5
ffffa300`239fffb0 fffff802`587f92b7     : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiInterruptSubDispatchNoLockNoEtw+0xfa
ffff880f`bd7aeae0 fffff802`5c185f87     : 00000000`00000000 00000000`00000001 00000000`00000000 00000000`00000014 : nt!KiInterruptDispatchNoLockNoEtw+0x37
ffff880f`bd7aec70 00000000`00000000     : 00000000`00000001 00000000`00000000 00000000`00000014 00000000`0000a554 : bhtsddr+0x15f87


SYMBOL_NAME:  bhtsddr+15f87

MODULE_NAME: bhtsddr

IMAGE_NAME:  bhtsddr.sys

STACK_COMMAND:  .cxr; .ecxr ; kb

BUCKET_ID_FUNC_OFFSET:  15f87

FAILURE_BUCKET_ID:  0x133_ISR_bhtsddr!unknown_function

OS_VERSION:  10.0.19041.1

BUILDLAB_STR:  vb_release

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

FAILURE_ID_HASH:  {901d7f27-c8b9-1db7-6528-a08b6daeeb97}

Followup:     MachineOwner
---------
 
Son düzenleyen: Moderatör:
Yeni oluşan minidump dosyasını paylaşır mısınız?

Bütün driverları yeniden kurup DDU ile temiz kurulum da yapmıştım fakat düzelmedi.
Kod:
Microsoft (R) Windows Debugger Version 10.0.22473.1005 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.


Loading Dump File [C:\Users\ULAŞ\Desktop\121321-13281-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available


************* Path validation summary **************
Response                         Time (ms)     Location
Deferred                                       srv*
Symbol search path is: srv*
Executable search path is:
Windows 10 Kernel Version 19041 MP (16 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS
Edition build lab: 19041.1.amd64fre.vb_release.191206-1406
Machine Name:
Kernel base = 0xfffff803`56400000 PsLoadedModuleList = 0xfffff803`5702a2d0
Debug session time: Mon Dec 13 14:37:16.264 2021 (UTC + 3:00)
System Uptime: 1 days 20:42:32.625
Loading Kernel Symbols
...............................................................
................................................................
................................................................
..............
Loading User Symbols
Loading unloaded module list
............................................
For analysis of this file, run !analyze -v
nt!KeBugCheckEx:
fffff803`567f72a0 48894c2408      mov     qword ptr [rsp+8],rcx ss:0018:ffff9d81`1e67fe20=0000000000000133
3: kd> !analyze -v
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

DPC_WATCHDOG_VIOLATION (133)
The DPC watchdog detected a prolonged run time at an IRQL of DISPATCH_LEVEL
or above.
Arguments:
Arg1: 0000000000000001, The system cumulatively spent an extended period of time at
    DISPATCH_LEVEL or above. The offending component can usually be
    identified with a stack trace.
Arg2: 0000000000001e00, The watchdog period.
Arg3: fffff803570fb320, cast to nt!DPC_WATCHDOG_GLOBAL_TRIAGE_BLOCK, which contains
    additional information regarding the cumulative timeout
Arg4: 0000000000000000

Debugging Details:
------------------

*** WARNING: Unable to verify timestamp for bhtsddr.sys
*************************************************************************
***                                                                   ***
***                                                                   ***
***    Either you specified an unqualified symbol, or your debugger   ***
***    doesn't have full symbol information.  Unqualified symbol      ***
***    resolution is turned off by default. Please either specify a   ***
***    fully qualified symbol module!symbolname, or enable resolution ***
***    of unqualified symbols by typing ".symopt- 100". Note that     ***
***    enabling unqualified symbol resolution with network symbol     ***
***    server shares in the symbol path may cause the debugger to     ***
***    appear to hang for long periods of time when an incorrect      ***
***    symbol name is typed or the network symbol server is down.     ***
***                                                                   ***
***    For some commands to work properly, your symbol path           ***
***    must point to .pdb files that have full type information.      ***
***                                                                   ***
***    Certain .pdb files (such as the public OS symbols) do not      ***
***    contain the required information.  Contact the group that      ***
***    provided you with these symbols if you need this command to    ***
***    work.                                                          ***
***                                                                   ***
***    Type referenced: TickPeriods                                   ***
***                                                                   ***
*************************************************************************
*** WARNING: Unable to verify checksum for win32k.sys

KEY_VALUES_STRING: 1

    Key  : Analysis.CPU.mSec
    Value: 3655

    Key  : Analysis.DebugAnalysisManager
    Value: Create

    Key  : Analysis.Elapsed.mSec
    Value: 7806

    Key  : Analysis.Init.CPU.mSec
    Value: 343

    Key  : Analysis.Init.Elapsed.mSec
    Value: 2607

    Key  : Analysis.Memory.CommitPeak.Mb
    Value: 85

    Key  : WER.OS.Branch
    Value: vb_release

    Key  : WER.OS.Timestamp
    Value: 2019-12-06T14:06:00Z

    Key  : WER.OS.Version
    Value: 10.0.19041.1


FILE_IN_CAB:  121321-13281-01.dmp

BUGCHECK_CODE:  133

BUGCHECK_P1: 1

BUGCHECK_P2: 1e00

BUGCHECK_P3: fffff803570fb320

BUGCHECK_P4: 0

DPC_TIMEOUT_TYPE:  DPC_QUEUE_EXECUTION_TIMEOUT_EXCEEDED

TRAP_FRAME:  ffff828a79e31a50 -- (.trap 0xffff828a79e31a50)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000000 rbx=0000000000000000 rcx=fffff7c140001000
rdx=00009ce900000000 rsi=0000000000000000 rdi=0000000000000000
rip=fffff8035661f560 rsp=ffff828a79e31be8 rbp=000000000000b401
 r8=0000000000000008  r9=0000000000000065 r10=fffff80356763170
r11=0000000000000000 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0         nv up ei pl zr na po nc
nt!HalpTimerGetInternalData:
fffff803`5661f560 f781e000000000000100 test dword ptr [rcx+0E0h],10000h ds:fffff7c1`400010e0=01000007
Resetting default scope

BLACKBOXBSD: 1 (!blackboxbsd)


BLACKBOXNTFS: 1 (!blackboxntfs)


BLACKBOXPNP: 1 (!blackboxpnp)


BLACKBOXWINLOGON: 1

CUSTOMER_CRASH_COUNT:  1

PROCESS_NAME:  System

STACK_TEXT: 
ffff9d81`1e67fe18 fffff803`5681f67e     : 00000000`00000133 00000000`00000001 00000000`00001e00 fffff803`570fb320 : nt!KeBugCheckEx
ffff9d81`1e67fe20 fffff803`56616953     : 00009ce9`190aa76e ffff9d81`1e3eb180 00000000`00000000 ffff9d81`1e3eb180 : nt!KeAccumulateTicks+0x2064ce
ffff9d81`1e67fe80 fffff803`5661643a     : ffffc304`d26e7d40 ffff828a`79e31ad0 00000000`00000000 00000000`00000000 : nt!KeClockInterruptNotify+0x453
ffff9d81`1e67ff30 fffff803`566de055     : ffffc304`d26e7d40 00000000`00000000 00000000`00000000 ffff12b8`f8729a77 : nt!HalpTimerClockIpiRoutine+0x1a
ffff9d81`1e67ff60 fffff803`567f8d4a     : ffff828a`79e31ad0 ffffc304`d26e7d40 00000000`00000001 00000000`00000000 : nt!KiCallInterruptServiceRoutine+0xa5
ffff9d81`1e67ffb0 fffff803`567f92b7     : 00000000`00000087 fffff803`567f933f 00000000`00000010 00000000`00000000 : nt!KiInterruptSubDispatchNoLockNoEtw+0xfa
ffff828a`79e31a50 fffff803`5661f560     : fffff803`5661f4c4 fffff803`5704ee00 fffff803`5661b3a5 fffff803`5704ee00 : nt!KiInterruptDispatchNoLockNoEtw+0x37
ffff828a`79e31be8 fffff803`5661f4c4     : fffff803`5704ee00 fffff803`5661b3a5 fffff803`5704ee00 fffff803`5661c047 : nt!HalpTimerGetInternalData
ffff828a`79e31bf0 fffff803`5a185cc6     : 00000000`000003d3 00000000`00000001 00000000`00000000 00000000`00000014 : nt!KeStallExecutionProcessor+0x114
ffff828a`79e31c70 00000000`000003d3     : 00000000`00000001 00000000`00000000 00000000`00000014 00000000`0000a553 : bhtsddr+0x15cc6
ffff828a`79e31c78 00000000`00000001     : 00000000`00000000 00000000`00000014 00000000`0000a553 fffff803`5a179b9d : 0x3d3
ffff828a`79e31c80 00000000`00000000     : 00000000`00000014 00000000`0000a553 fffff803`5a179b9d ffffc304`d4439020 : 0x1


SYMBOL_NAME:  bhtsddr+15cc6

MODULE_NAME: bhtsddr

IMAGE_NAME:  bhtsddr.sys

STACK_COMMAND:  .cxr; .ecxr ; kb

BUCKET_ID_FUNC_OFFSET:  15cc6

FAILURE_BUCKET_ID:  0x133_ISR_bhtsddr!unknown_function

OS_VERSION:  10.0.19041.1

BUILDLAB_STR:  vb_release

OSPLATFORM_TYPE:  x64

OSNAME:  Windows 10

FAILURE_ID_HASH:  {901d7f27-c8b9-1db7-6528-a08b6daeeb97}

Followup:     MachineOwner
---------
 
Dump dosyasını atın demiştim, çıktısını değil. Lütfen minidump dosyasını Drive'a yükleyip bizimle paylaşın.
 

Bu konuyu görüntüleyen kullanıcılar

Bu siteyi kullanmak için çerezler gereklidir. Siteyi kullanmaya devam etmek için çerezleri kabul etmelisiniz. Daha Fazlasını Öğren.…