블루스크린 문의드립니다
컴퓨터 부팅 이후 사용 중 프리징 현상이 발생합니다. 이후 시간 제약 없이 계속된 프리징 현상이 발생하거나 블루스크린이 발생합니다.
프리징 지속시간은 무작위입니다. 짧게는 3분, 길게는 50분 이상 지속 되기도 합니다.
블루스크린 중지코드 : dpc_watchdog_violation.
이벤트 이슈 : 위험단계의 목록입니다.
정말 무작위하게 프리징이 발생합니다. 첫 번째와 다섯 번째 로그는 프리징현상 이후 10분 이내에 블루스크린이 발생해서 기록이 있지만 이외 로그들은 프리징현상이 30분을 넘겨 강제부팅하여 기록이 남아있지 않습니다.
아래에 몇 가지 참고사항을 첨부해드립니다.
개인적인 생각으로 드라이버간의 충돌일 것 같은데 정확한 원인이 무엇인지 모르겠네요.
원인이 무엇인지, 해결방법을 알려주시면 대단히 감사하겠습니다.
-*참고1 : 가장 최근 이벤트의 XML
- <Event xmlns="**http://schemas.microsoft.com/win/2004/08/events/event**">
- <System>
<Provider Name="Microsoft-Windows-Kernel-Power" Guid="{331c3b3a-2005-44c2-ac5e-77220c37d6b4}" /><EventID>41</EventID><Version>8</Version><Level>1</Level><Task>63</Task><Opcode>0</Opcode><Keywords>0x8000400000000002</Keywords><TimeCreated SystemTime="2023-10-08T06:34:02.7423295Z" /><EventRecordID>1992</EventRecordID><Correlation /><Execution ProcessID="4" ThreadID="8" /><Channel>System</Channel><Computer>DESKTOP-VBRJHNB</Computer><Security UserID="S-1-5-18" /></System>
- <EventData>
<Data Name="BugcheckCode">307</Data><Data Name="BugcheckParameter1">0x1</Data><Data Name="BugcheckParameter2">0x1e00</Data><Data Name="BugcheckParameter3">0xfffff8040eafb320</Data><Data Name="BugcheckParameter4">0x0</Data><Data Name="SleepInProgress">0</Data><Data Name="PowerButtonTimestamp">0</Data><Data Name="BootAppStatus">0</Data><Data Name="Checkpoint">0</Data><Data Name="ConnectedStandbyInProgress">false</Data><Data Name="SystemSleepTransitionsToOn">0</Data><Data Name="CsEntryScenarioInstanceId">0</Data><Data Name="BugcheckInfoFromEFI">false</Data><Data Name="CheckpointStatus">0</Data><Data Name="CsEntryScenarioInstanceIdV2">0</Data><Data Name="LongPowerButtonPressDetected">false</Data></EventData>
</Event>
-*참고2 : 미니 덤프파일
--**가장 최근에 일어난 블루스크린에 대한 미니덤프파일 내용
************* Preparing the environment for Debugger Extensions Gallery repositories **************
ExtensionRepository : Implicit
UseExperimentalFeatureForNugetShare : false
AllowNugetExeUpdate : false
AllowNugetMSCredentialProviderInstall : false
AllowParallelInitializationOfLocalRepositories : true
-- Configuring repositories
----> Repository : LocalInstalled, Enabled: true
----> Repository : UserExtensions, Enabled: true
>>>>>>>>>>>>> Preparing the environment for Debugger Extensions Gallery repositories completed, duration 0.000 seconds
************* Waiting for Debugger Extensions Gallery to Initialize **************
>>>>>>>>>>>>> Waiting for Debugger Extensions Gallery to Initialize completed, duration 0.031 seconds
----> Repository : UserExtensions, Enabled: true, Packages count: 0
----> Repository : LocalInstalled, Enabled: true, Packages count: 36
Microsoft (R) Windows Debugger Version 10.0.25877.1004 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [C:\Windows\Minidump\100823-7796-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
Symbol search path is: srv*
Executable search path is:
Windows 10 Kernel Version 19041 MP (6 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS
Edition build lab: 19041.1.amd64fre.vb_release.191206-1406
Kernel base = 0xfffff8040de00000 PsLoadedModuleList = 0xfffff8040ea2a220
Debug session time: Sun Oct 8 15:33:01.436 2023 (UTC + 9:00)
System Uptime: 0 days 0:12:24.281
Loading Kernel Symbols
...............................................................
................................................................
.....................................................
Loading User Symbols
PEB is paged out (Peb.Ldr = 000000000033c018). Type ".hh dbgerr001" for details Loading unloaded module list ............ For analysis of this file, run !analyze -v nt!KeBugCheckEx: fffff8040e1fcd70 48894c2408 mov qword ptr [rsp+8],rcx ss:fffff804`12cb7c90=0000000000000133
0: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
DPC_WATCHDOG_VIOLATION (133)
The DPC watchdog detected a prolonged run time at an IRQL of DISPATCH_LEVEL
or above.
Arguments:
Arg1: 0000000000000001, The system cumulatively spent an extended period of time at
DISPATCH_LEVEL or above.
Arg2: 0000000000001e00, The watchdog period (in ticks).
Arg3: fffff8040eafb320, cast to nt!DPC_WATCHDOG_GLOBAL_TRIAGE_BLOCK, which contains
additional information regarding the cumulative timeout
Arg4: 0000000000000000
Debugging Details:
*************************************************************************
*** ***
*** ***
*** Either you specified an unqualified symbol, or your debugger ***
*** doesn't have full symbol information. Unqualified symbol ***
*** resolution is turned off by default. Please either specify a ***
*** fully qualified symbol module!symbolname, or enable resolution ***
*** of unqualified symbols by typing ".symopt- 100". Note that ***
*** enabling unqualified symbol resolution with network symbol ***
*** server shares in the symbol path may cause the debugger to ***
*** appear to hang for long periods of time when an incorrect ***
*** symbol name is typed or the network symbol server is down. ***
*** ***
*** For some commands to work properly, your symbol path ***
*** must point to .pdb files that have full type information. ***
*** ***
*** Certain .pdb files (such as the public OS symbols) do not ***
*** contain the required information. Contact the group that ***
*** provided you with these symbols if you need this command to ***
*** work. ***
*** ***
*** Type referenced: TickPeriods ***
*** ***
*************************************************************************
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 3296
Key : Analysis.Elapsed.mSec
Value: 4694
Key : Analysis.IO.Other.Mb
Value: 0
Key : Analysis.IO.Read.Mb
Value: 0
Key : Analysis.IO.Write.Mb
Value: 0
Key : Analysis.Init.CPU.mSec
Value: 421
Key : Analysis.Init.Elapsed.mSec
Value: 4287
Key : Analysis.Memory.CommitPeak.Mb
Value: 93
Key : Bugcheck.Code.LegacyAPI
Value: 0x133
Key : Failure.Bucket
Value: 0x133\_ISR\_nt!KeAccumulateTicks
Key : Failure.Hash
Value: {65350307-c3b9-f4b5-8829-4d27e9ff9b06}
Key : WER.OS.Branch
Value: vb\_release
Key : WER.OS.Version
Value: 10.0.19041.1
BUGCHECK_CODE: 133
BUGCHECK_P1: 1
BUGCHECK_P2: 1e00
BUGCHECK_P3: fffff8040eafb320
BUGCHECK_P4: 0
FILE_IN_CAB: 100823-7796-01.dmp
DPC_TIMEOUT_TYPE: DPC_QUEUE_EXECUTION_TIMEOUT_EXCEEDED
TRAP_FRAME: fffffc8dc717ef90 -- (.trap 0xfffffc8dc717ef90)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000001 rbx=0000000000000000 rcx=ffffc50599ae4340
rdx=0000000000000000 rsi=0000000000000000 rdi=0000000000000000
rip=fffff8040e084810 rsp=fffffc8dc717f120 rbp=0000000000000003
r8=0000000000000000 r9=00000000000000e1 r10=fffff8040e137090
r11=0000000000000000 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei ng nz na pe nc
nt!KiIpiSendRequestEx+0xb0:
fffff8040e084810 8b87802d0000 mov eax,dword ptr [rdi+2D80h] ds:0000000000002d80=????????
Resetting default scope
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: 537.42-desktop-win10-win11-64bit-international-dch-whql.exe
STACK_TEXT:
fffff80412cb7c88 fffff8040e230f64 : 0000000000000133 0000000000000001 0000000000001e00 fffff8040eafb320 : nt!KeBugCheckEx
fffff80412cb7c90 fffff8040e048dbd : 0000020fcc75ccdd fffff8040a7c3180 0000000000000246 000000000000ba12 : nt!KeAccumulateTicks+0x1eb3c4
fffff80412cb7cf0 fffff8040e03fe41 : 0000000000009c00 0000000000006ee8 fffff8040a7c3180 0000000000000001 : nt!KiUpdateRunTime+0x5d
fffff80412cb7d40 fffff8040e0431d3 : fffff8040a7c3180 0000000000000000 fffff8040ea31630 0000000000000000 : nt!KiUpdateTime+0x4a1
fffff80412cb7e80 fffff8040e04aa62 : fffffc8dc717ef90 fffffc8dc717f010 fffffc8dc717f000 000000000000000c : nt!KeClockInterruptNotify+0x2e3
fffff80412cb7f30 fffff8040e0a7765 : 00000001bbb76be7 fffff8040eaf3a20 fffff8040eaf3ad0 0000000000000000 : nt!HalpTimerClockInterrupt+0xe2
fffff80412cb7f60 fffff8040e1fed0a : fffffc8dc717f010 fffff8040eaf3a20 0000000000000001 000000000a2453e3 : nt!KiCallInterruptServiceRoutine+0xa5
fffff80412cb7fb0 fffff8040e1ff4d7 : 00000000b4240c26 fffff8040a7c6088 fffffc8dc717f0c1 0000000000000003 : nt!KiInterruptSubDispatchNoLockNoEtw+0xfa
fffffc8dc717ef90 fffff8040e084810 : c505997200000000 0000000000000001 0000000000000001 0a000002a5277867 : nt!KiInterruptDispatchNoLockNoEtw+0x37
fffffc8dc717f120 fffff8040e0cdcac : 0000000000000000 0000000000000002 0000000000000000 ffff958007ef76a2 : nt!KiIpiSendRequestEx+0xb0
fffffc8dc717f160 fffff8040e0cd9eb : 0000000000000004 0000000000000000 fffffc8dc717f5a0 0000000000000002 : nt!KxFlushEntireTb+0x1bc
fffffc8dc717f1b0 fffff8040e0cd7ea : 0000000000000000 0000000000000000 0000000000000000 ffffc50599ae4300 : nt!KeFlushTb+0x7b
fffffc8dc717f210 fffff8040e0b79f5 : 0000000000000000 0000000000000000 ffff95800667c800 ffff95800667c800 : nt!MiFlushEntireTbDueToAttributeChange+0x3a
fffffc8dc717f300 fffff8040e036d25 : 8a0000022298086b 0000000000000001 ffff95800667c822 0000000000000000 : nt!MiChangePageAttributeBatch+0x91
fffffc8dc717f370 fffff8040e033aa8 : fffffc8dc717f730 0000000000000000 0000000000000001 fffffb7d00000001 : nt!MiGetPageChain+0xd75
fffffc8dc717f5b0 fffff8040e024610 : fffffc8dc717f730 ffffc50599ae49c0 fffffb0000000000 0000000000000000 : nt!MiResolvePrivateZeroFault+0x6e8
fffffc8dc717f6e0 fffff8040e03121d : fffffc8dc717f920 fffffc8dc717f860 fffffc8dc717f868 fffffc8dc717f878 : nt!MiZeroFault+0x380
fffffc8dc717f7d0 fffff8040e03049a : 00000000033bfa01 0000000000000000 0000000000000000 0000000000000000 : nt!MiUserFault+0x80d
fffffc8dc717f860 fffff8040e20c8d8 : 00000000144053e3 ffffc505998e1080 0000000000000000 ffffc50500000000 : nt!MmAccessFault+0x16a
fffffc8dc717fa00 0000000000459296 : 0000000000000000 0000000000000000 0000000000000000 0000000000000000 : nt!KiPageFault+0x358
00000000033bfa1c 0000000000000000 : 0000000000000000 0000000000000000 0000000000000000 0000000000000000 : 0x459296
SYMBOL_NAME: nt!KeAccumulateTicks+1eb3c4
MODULE_NAME: nt
IMAGE_NAME: ntkrnlmp.exe
IMAGE_VERSION: 10.0.19041.3448
STACK_COMMAND: .cxr; .ecxr ; kb
BUCKET_ID_FUNC_OFFSET: 1eb3c4
FAILURE_BUCKET_ID: 0x133_ISR_nt!KeAccumulateTicks
OS_VERSION: 10.0.19041.1
BUILDLAB_STR: vb_release
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {65350307-c3b9-f4b5-8829-4d27e9ff9b06}
Followup: MachineOwner
--**처음 발생한 블루스크린의 미니덤프파일 내용
************* Preparing the environment for Debugger Extensions Gallery repositories **************
ExtensionRepository : Implicit
UseExperimentalFeatureForNugetShare : false
AllowNugetExeUpdate : false
AllowNugetMSCredentialProviderInstall : false
AllowParallelInitializationOfLocalRepositories : true
-- Configuring repositories
----> Repository : LocalInstalled, Enabled: true
----> Repository : UserExtensions, Enabled: true
>>>>>>>>>>>>> Preparing the environment for Debugger Extensions Gallery repositories completed, duration 0.000 seconds
************* Waiting for Debugger Extensions Gallery to Initialize **************
>>>>>>>>>>>>> Waiting for Debugger Extensions Gallery to Initialize completed, duration 0.016 seconds
----> Repository : UserExtensions, Enabled: true, Packages count: 0
----> Repository : LocalInstalled, Enabled: true, Packages count: 36
Microsoft (R) Windows Debugger Version 10.0.25877.1004 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [C:\Windows\Minidump\100823-8890-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
************* Path validation summary **************
Response Time (ms) Location
Deferred srv*
Symbol search path is: srv*
Executable search path is:
Windows 10 Kernel Version 19041 MP (6 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS
Edition build lab: 19041.1.amd64fre.vb_release.191206-1406
Kernel base = 0xfffff8021d000000 PsLoadedModuleList = 0xfffff8021dc2a220
Debug session time: Sun Oct 8 05:25:14.701 2023 (UTC + 9:00)
System Uptime: 0 days 1:19:57.547
Loading Kernel Symbols
...............................................................
................................................................
......................................................
Loading User Symbols
PEB is paged out (Peb.Ldr = 000000342fd67018). Type ".hh dbgerr001" for details Loading unloaded module list ............. For analysis of this file, run !analyze -v nt!KeBugCheckEx: fffff8021d3fcd70 48894c2408 mov qword ptr [rsp+8],rcx ss:0018:ffffb680`7afdae20=0000000000000133
1: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
DPC_WATCHDOG_VIOLATION (133)
The DPC watchdog detected a prolonged run time at an IRQL of DISPATCH_LEVEL
or above.
Arguments:
Arg1: 0000000000000001, The system cumulatively spent an extended period of time at
DISPATCH_LEVEL or above.
Arg2: 0000000000001e00, The watchdog period (in ticks).
Arg3: fffff8021dcfb320, cast to nt!DPC_WATCHDOG_GLOBAL_TRIAGE_BLOCK, which contains
additional information regarding the cumulative timeout
Arg4: 0000000000000000
Debugging Details:
*************************************************************************
*** ***
*** ***
*** Either you specified an unqualified symbol, or your debugger ***
*** doesn't have full symbol information. Unqualified symbol ***
*** resolution is turned off by default. Please either specify a ***
*** fully qualified symbol module!symbolname, or enable resolution ***
*** of unqualified symbols by typing ".symopt- 100". Note that ***
*** enabling unqualified symbol resolution with network symbol ***
*** server shares in the symbol path may cause the debugger to ***
*** appear to hang for long periods of time when an incorrect ***
*** symbol name is typed or the network symbol server is down. ***
*** ***
*** For some commands to work properly, your symbol path ***
*** must point to .pdb files that have full type information. ***
*** ***
*** Certain .pdb files (such as the public OS symbols) do not ***
*** contain the required information. Contact the group that ***
*** provided you with these symbols if you need this command to ***
*** work. ***
*** ***
*** Type referenced: TickPeriods ***
*** ***
*************************************************************************
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 3093
Key : Analysis.Elapsed.mSec
Value: 4442
Key : Analysis.IO.Other.Mb
Value: 0
Key : Analysis.IO.Read.Mb
Value: 0
Key : Analysis.IO.Write.Mb
Value: 0
Key : Analysis.Init.CPU.mSec
Value: 437
Key : Analysis.Init.Elapsed.mSec
Value: 2064
Key : Analysis.Memory.CommitPeak.Mb
Value: 93
Key : Bugcheck.Code.LegacyAPI
Value: 0x133
Key : Failure.Bucket
Value: 0x133\_ISR\_nt!KeAccumulateTicks
Key : Failure.Hash
Value: {65350307-c3b9-f4b5-8829-4d27e9ff9b06}
Key : WER.OS.Branch
Value: vb\_release
Key : WER.OS.Version
Value: 10.0.19041.1
BUGCHECK_CODE: 133
BUGCHECK_P1: 1
BUGCHECK_P2: 1e00
BUGCHECK_P3: fffff8021dcfb320
BUGCHECK_P4: 0
FILE_IN_CAB: 100823-8890-01.dmp
DPC_TIMEOUT_TYPE: DPC_QUEUE_EXECUTION_TIMEOUT_EXCEEDED
TRAP_FRAME: ffff8a86607dee50 -- (.trap 0xffff8a86607dee50)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000001 rbx=0000000000000000 rcx=cf98da8cdb2f0000
rdx=0000000000000000 rsi=0000000000000000 rdi=0000000000000000
rip=fffff8021d2cdeb1 rsp=ffff8a86607defe0 rbp=ffffffffffffffff
r8=0000000000000000 r9=00000000000000e1 r10=fffff8021d4d1430
r11=0000000000000000 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei pl nz na pe nc
nt!KeFlushProcessWriteBuffers+0xb5:
fffff8021d2cdeb1 ebf2 jmp nt!KeFlushProcessWriteBuffers+0xa9 (fffff8021d2cdea5)
Resetting default scope
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXPNP: 1 (!blackboxpnp)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: dialer.exe
STACK_TEXT:
ffffb6807afdae18 fffff8021d430f64 : 0000000000000133 0000000000000001 0000000000001e00 fffff8021dcfb320 : nt!KeBugCheckEx
ffffb6807afdae20 fffff8021d243343 : 00000d23e0492674 ffffb6807af88180 0000000000000000 ffffb6807af88180 : nt!KeAccumulateTicks+0x1eb3c4
ffffb6807afdae80 fffff8021d242e2a : ffff8e074a4a7480 ffff8a86607deed0 0000000000000000 0000000000000050 : nt!KeClockInterruptNotify+0x453
ffffb6807afdaf30 fffff8021d2a7765 : ffff8e074a4a7480 fffff8021d34ea57 0000000000000000 0000000000000000 : nt!HalpTimerClockIpiRoutine+0x1a
ffffb6807afdaf60 fffff8021d3fed0a : ffff8a86607deed0 ffff8e074a4a7480 0000000000000001 0000000000000000 : nt!KiCallInterruptServiceRoutine+0xa5
ffffb6807afdafb0 fffff8021d3ff4d7 : 0000000000000000 fffff8021dd2f1a0 fffff8021a6df0b8 fffff8021d2ce34a : nt!KiInterruptSubDispatchNoLockNoEtw+0xfa
ffff8a86607dee50 fffff8021d2cdeb1 : ffff8a86607df028 ffff8a86607df020 0000000000000000 0000000000000000 : nt!KiInterruptDispatchNoLockNoEtw+0x37
ffff8a86607defe0 fffff8021d6025b3 : 0000000000000000 ffff8a86607dfa80 0000000000000001 0000000000000001 : nt!KeFlushProcessWriteBuffers+0xb5
ffff8a86607df020 fffff8021d5f9067 : 0000000000000001 0000000000010000 0000000000000000 0000000000000000 : nt!ExpGetProcessInformation+0x183
ffff8a86607df680 fffff8021d5f8217 : ffff8e075ae4d080 fffff8021d6b1dbf 0000000000000000 0000000000000000 : nt!ExpQuerySystemInformation+0xd07
ffff8a86607df9c0 fffff8021d4105f5 : 0000000000000000 ffff8e0759a10080 fffffffffff0bdc0 ffff8e0759dad080 : nt!NtQuerySystemInformation+0x37
ffff8a86607dfa00 00007fff606ed514 : 0000000000000000 0000000000000000 0000000000000000 0000000000000000 : nt!KiSystemServiceCopyEnd+0x25
000000343027fa48 0000000000000000 : 0000000000000000 0000000000000000 0000000000000000 0000000000000000 : 0x00007fff`606ed514
SYMBOL_NAME: nt!KeAccumulateTicks+1eb3c4
MODULE_NAME: nt
IMAGE_NAME: ntkrnlmp.exe
IMAGE_VERSION: 10.0.19041.3448
STACK_COMMAND: .cxr; .ecxr ; kb
BUCKET_ID_FUNC_OFFSET: 1eb3c4
FAILURE_BUCKET_ID: 0x133_ISR_nt!KeAccumulateTicks
OS_VERSION: 10.0.19041.1
BUILDLAB_STR: vb_release
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {65350307-c3b9-f4b5-8829-4d27e9ff9b06}
Followup: MachineOwner
---*** 위 두 가지 미니덤프파일 기록에 대한 압축링크입니다.
100823-7796-01.zip
100823-8890-01.zip
원인 분석 및 해결방법을 제시해주시기 바랍니다. 부탁드립니다.