联想的拯救者台式机,不知道为什么突然就蓝屏,一天起码得两次或以上,之前再社区问过试了更新驱动什么的方法但没有解决.以下为最近一次的错误日志错误代码为 DCP WATCHDOFG VIOLATIONMicrosoft (R) Windows Debugger Version 10.0.25136.1001 AMD64 Copyright (c) Microsoft Corporation. All rights reserved. Loading Dump File [C:\WINDOWS\MEMORY.DMP] Kernel Bitmap Dump File: Kernel address space is available, User address space may not be available. ************* Path validation summary ************** Response Time (ms) Location Deferred srv* Symbol search path is: srv* Executable search path is: Windows 10 Kernel Version 19041 MP (12 procs) Free x64 Product: WinNt, suite: TerminalServer SingleUserTS Personal Edition build lab: 19041.1.amd64fre.vb_release.191206-1406 Machine Name: Kernel base = 0xfffff800`5ce00000 PsLoadedModuleList = 0xfffff800`5da2a290 Debug session time: Fri Oct 21 20:19:09.214 2022 (UTC 8:00) System Uptime: 0 days 6:54:25.047 Loading Kernel Symbols ............................................................... ......Page 483dd not present in the dump file. Type ".hh dbgerr004" for details .......................................................... ................................................................ ....................... Loading User Symbols Loading unloaded module list ................. For analysis of this file, run !analyze -v nt!KeBugCheckEx: fffff800`5d1f8fa0 48894c2408 mov qword ptr [rsp 8],rcx ss:0018:fffff800`61ab3b10=0000000000000133 0: kd> !analyze -v ******************************************************************************* * * * Bugcheck Analysis * * * ******************************************************************************* DPC_WATCHDOG_VIOLATION (133) The DPC watchdog detected a prolonged run time at an IRQL of DISPATCH_LEVEL or above. Arguments: Arg1: 0000000000000001, The system cumulatively spent an extended period of time at DISPATCH_LEVEL or above. The offending component can usually be identified with a stack trace. Arg2: 0000000000001e00, The watchdog period. Arg3: fffff8005dafb320, cast to nt!DPC_WATCHDOG_GLOBAL_TRIAGE_BLOCK, which contains additional information regarding the cumulative timeout Arg4: 0000000000000000 Debugging Details: ------------------ ************************************************************************* *** *** *** *** *** Either you specified an unqualified symbol, or your debugger *** *** doesn't have full symbol information. Unqualified symbol *** *** resolution is turned off by default. Please either specify a *** *** fully qualified symbol module!symbolname, or enable resolution *** *** of unqualified symbols by typing ".symopt- 100". Note that *** *** enabling unqualified symbol resolution with network symbol *** *** server shares in the symbol path may cause the debugger to *** *** appear to hang for long periods of time when an incorrect *** *** symbol name is typed or the network symbol server is down. *** *** *** *** For some commands to work properly, your symbol path *** *** must point to .pdb files that have full type information. *** *** *** *** Certain .pdb files (such as the public OS symbols) do not *** *** contain the required information. Contact the group that *** *** provided you with these symbols if you need this command to *** *** work. *** *** *** *** Type referenced: TickPeriods *** *** *** ************************************************************************* KEY_VALUES_STRING: 1 Key : Analysis.CPU.mSec Value: 3093 Key : Analysis.DebugAnalysisManager Value: Create Key : Analysis.Elapsed.mSec Value: 3169 Key : Analysis.Init.CPU.mSec Value: 1546 Key : Analysis.Init.Elapsed.mSec Value: 2471 Key : Analysis.Memory.CommitPeak.Mb Value: 86 Key : Bugcheck.Code.DumpHeader Value: 0x133 Key : Bugcheck.Code.KiBugCheckData Value: 0x133 Key : Bugcheck.Code.Register Value: 0x133 Key : WER.OS.Branch Value: vb_release Key : WER.OS.Timestamp Value: 2019-12-06T14:06:00Z Key : WER.OS.Version Value: 10.0.19041.1 FILE_IN_CAB: MEMORY.DMP BUGCHECK_CODE: 133 BUGCHECK_P1: 1 BUGCHECK_P2: 1e00 BUGCHECK_P3: fffff8005dafb320 BUGCHECK_P4: 0 DPC_TIMEOUT_TYPE: DPC_QUEUE_EXECUTION_TIMEOUT_EXCEEDED TRAP_FRAME: fffff80061ab3cf0 -- (.trap 0xfffff80061ab3cf0) NOTE: The trap frame does not contain all registers. Some register values may be zeroed or incorrect. rax=fffff8005d198500 rbx=0000000000000000 rcx=0000000000001882 rdx=0000000000001882 rsi=0000000000000000 rdi=0000000000000000 rip=fffff8005d1985b9 rsp=fffff80061ab3e88 rbp=ffffbb8c1c4ba010 r8=fffff80061ab3f00 r9=0000000000000001 r10=fffff8005d1985b0 r11=0000000000000000 r12=0000000000000000 r13=0000000000000000 r14=0000000000000000 r15=0000000000000000 iopl=0 nv up ei pl zr na po nc nt!HalpAcpiPmRegisterReadPort 0x9: fffff800`5d1985b9 418800 mov byte ptr [r8],al ds:fffff800`61ab3f00=00 Resetting default scope BLACKBOXBSD: 1 (!blackboxbsd) BLACKBOXNTFS: 1 (!blackboxntfs) BLACKBOXPNP: 1 (!blackboxpnp) BLACKBOXWINLOGON: 1 PROCESS_NAME: System STACK_TEXT: fffff800`61ab3b08 fffff800`5d259782 : 00000000`00000133 00000000`00000001 00000000`00001e00 fffff800`5dafb320 : nt!KeBugCheckEx fffff800`61ab3b10 fffff800`5d0d2973 : 00003630`b1a66f06 fffff800`5942f180 00000000`00000000 fffff800`5942f180 : nt!KeAccumulateTicks 0x1845b2 fffff800`61ab3b70 fffff800`5d0d245a : fffff800`5daf38c0 fffff800`61ab3d70 00000000`00000000 00000000`00000010 : nt!KeClockInterruptNotify 0x453 fffff800`61ab3c20 fffff800`5d008a45 : fffff800`5daf38c0 00000000`00000000 00000000`0000000b fffff800`5d1faa4a : nt!HalpTimerClockIpiRoutine 0x1a fffff800`61ab3c50 fffff800`5d1faa4a : fffff800`61ab3d70 fffff800`5daf38c0 00003630`b1a5ca70 ffffbb8c`26395000 : nt!KiCallInterruptServiceRoutine 0xa5 fffff800`61ab3ca0 fffff800`5d1fafb7 : 00000000`00000000 00000000`00000000 00003630`b19dc0a4 fffff800`8195e131 : nt!KiInterruptSubDispatchNoLockNoEtw 0xfa fffff800`61ab3cf0 fffff800`5d1985b9 : fffff800`5d197b89 00000000`00000010 ffffbb8c`1c6fb000 ffffbb8c`1c8d9310 : nt!KiInterruptDispatchNoLockNoEtw 0x37 fffff800`61ab3e88 fffff800`5d197b89 : 00000000`00000010 ffffbb8c`1c6fb000 ffffbb8c`1c8d9310 00000000`000002c8 : nt!HalpAcpiPmRegisterReadPort 0x9 fffff800`61ab3e90 fffff800`6014680a : 00000000`00000002 ffffcf01`bb5b9280 fffff800`61ab3f98 00000000`00000f43 : nt!HalpAcpiPmRegisterRead 0x39 fffff800`61ab3ec0 fffff800`60145d84 : 00000000`00000000 ffffcf01`bb5b9dc0 00000000`00000f43 fffff800`00400a02 : ACPI!ACPIReadGpeStatusRegister 0x66 fffff800`61ab3f00 fffff800`5d008a45 : ffffcf01`bb5b9dc0 ffffbb8c`1cff0d70 ffffcf01`bb5b9e70 ffff3ace`b139024f : ACPI!ACPIInterruptServiceRoutine 0x54 fffff800`61ab3f40 fffff800`5d1fa7cf : fffff800`61aa4510 ffffcf01`bb5b9dc0 000035df`8edcb305 00003630`b1a5c6a4 : nt!KiCallInterruptServiceRoutine 0xa5 fffff800`61ab3f90 fffff800`5d1faa97 : 00000000`00000003 fffff800`5d031b79 00000000`00000000 00000039`9d32c5b1 : nt!KiInterruptSubDispatch 0x11f fffff800`61aa4490 fffff800`5d1985b9 : fffff800`5d197b89 00000000`00000007 00000000`00000000 00000003`01010000 : nt!KiInterruptDispatch 0x37 fffff800`61aa4628 fffff800`5d197b89 : 00000000`00000007 00000000`00000000 00000003`01010000 fffffff6`00000002 : nt!HalpAcpiPmRegisterReadPort 0x9 fffff800`61aa4630 fffff800`6014680a : 00000000`00000003 00000000`00000007 00000000`00000003 00000039`9d8828de : nt!HalpAcpiPmRegisterRead 0x39 fffff800`61aa4660 fffff800`601465a4 : 00000000`80010000 ffffbb8c`266970f0 00000000`00000000 00000000`00000001 : ACPI!ACPIReadGpeStatusRegister 0x66 fffff800`61aa46a0 fffff800`60145d01 : 00000000`80010000 ffffbb8c`1c4ba010 00000000`80010000 00000000`00000000 : ACPI!ACPIInterruptDispatchEvents 0x5c fffff800`61aa4730 fffff800`5d03489e : fffff800`59432240 fffff800`61aa4860 fffff800`61aa4a20 fffff800`5942f180 : ACPI!ACPIInterruptServiceRoutineDPC 0xb1 fffff800`61aa4760 fffff800`5d033b84 : 00000000`00000000 00000000`00000000 00000000`00140001 00000000`00000000 : nt!KiExecuteAllDpcs 0x30e fffff800`61aa48d0 fffff800`5d1fcb3e : 00000000`00000000 fffff800`5942f180 fffff800`5db27a00 ffffbb8c`33d94080 : nt!KiRetireDpcList 0x1f4 fffff800`61aa4b60 00000000`00000000 : fffff800`61aa5000 fffff800`61a9e000 00000000`00000000 00000000`00000000 : nt!KiIdleLoop 0x9e SYMBOL_NAME: ACPI!ACPIReadGpeStatusRegister 66 MODULE_NAME: ACPI IMAGE_NAME: ACPI.sys STACK_COMMAND: .cxr; .ecxr ; kb BUCKET_ID_FUNC_OFFSET: 66 FAILURE_BUCKET_ID: 0x133_ISR_ACPI!ACPIReadGpeStatusRegister OS_VERSION: 10.0.19041.1 BUILDLAB_STR: vb_release OSPLATFORM_TYPE: x64 OSNAME: Windows 10 FAILURE_ID_HASH: {9524459d-2f22-efe5-b0c9-f824c586f42c} Followup: MachineOwner --------- Microsoft (R) Windows Debugger Version 10.0.25136.1001 AMD64 Copyright (c) Microsoft Corporation. All rights reserved. Loading Dump File [C:\WINDOWS\MEMORY.DMP] Kernel Bitmap Dump File: Kernel address space is available, User address space may not be available. ************* Path validation summary ************** Response                         Time (ms)     Location Deferred                                       srv* Symbol search path is: srv* Executable search path is:  Windows 10 Kernel Version 19041 MP (12 procs) Free x64 Product: WinNt, suite: TerminalServer SingleUserTS Personal Edition build lab: 19041.1.amd64fre.vb_release.191206-1406 Machine Name: Kernel base = 0xfffff800`5ce00000 PsLoadedModuleList = 0xfffff800`5da2a290 Debug session time: Fri Oct 21 20:19:09.214 2022 (UTC   8:00) System Uptime: 0 days 6:54:25.047 Loading Kernel Symbols ............................................................... ......Page 483dd not present in the dump file. Type ".hh dbgerr004" for details .......................................................... ................................................................ ....................... Loading User Symbols Loading unloaded module list ................. For analysis of this file, run !analyze -v nt!KeBugCheckEx: fffff800`5d1f8fa0 48894c2408      mov     qword ptr [rsp 8],rcx ss:0018:fffff800`61ab3b10=0000000000000133 0: kd> !analyze -v ******************************************************************************* *                                                                             * *                        Bugcheck Analysis                                    * *                                                                             * ******************************************************************************* DPC_WATCHDOG_VIOLATION (133) The DPC watchdog detected a prolonged run time at an IRQL of DISPATCH_LEVEL or above. Arguments: Arg1: 0000000000000001, The system cumulatively spent an extended period of time at DISPATCH_LEVEL or above. The offending component can usually be identified with a stack trace. Arg2: 0000000000001e00, The watchdog period. Arg3: fffff8005dafb320, cast to nt!DPC_WATCHDOG_GLOBAL_TRIAGE_BLOCK, which contains additional information regarding the cumulative timeout Arg4: 0000000000000000 Debugging Details: ------------------ ************************************************************************* ***                                                                   *** ***                                                                   *** ***    Either you specified an unqualified symbol, or your debugger   *** ***    doesn't have full symbol information.  Unqualified symbol      *** ***    resolution is turned off by default. Please either specify a   *** ***    fully qualified symbol module!symbolname, or enable resolution *** ***    of unqualified symbols by typing ".symopt- 100". Note that     *** ***    enabling unqualified symbol resolution with network symbol     *** ***    server shares in the symbol path may cause the debugger to     *** ***    appear to hang for long periods of time when an incorrect      *** ***    symbol name is typed or the network symbol server is down.     *** ***                                                                   *** ***    For some commands to work properly, your symbol path           *** ***    must point to .pdb files that have full type information.      *** ***                                                                   *** ***    Certain .pdb files (such as the public OS symbols) do not      *** ***    contain the required information.  Contact the group that      *** ***    provided you with these symbols if you need this command to    *** ***    work.                                                          *** ***                                                                   *** ***    Type referenced: TickPeriods                                   *** ***                                                                   *** ************************************************************************* KEY_VALUES_STRING: 1     Key  : Analysis.CPU.mSec     Value: 3093     Key  : Analysis.DebugAnalysisManager     Value: Create     Key  : Analysis.Elapsed.mSec     Value: 3169     Key  : Analysis.Init.CPU.mSec     Value: 1546     Key  : Analysis.Init.Elapsed.mSec     Value: 2471     Key  : Analysis.Memory.CommitPeak.Mb     Value: 86     Key  : Bugcheck.Code.DumpHeader     Value: 0x133     Key  : Bugcheck.Code.KiBugCheckData     Value: 0x133     Key  : Bugcheck.Code.Register     Value: 0x133     Key  : WER.OS.Branch     Value: vb_release     Key  : WER.OS.Timestamp     Value: 2019-12-06T14:06:00Z     Key  : WER.OS.Version     Value: 10.0.19041.1 FILE_IN_CAB:  MEMORY.DMP BUGCHECK_CODE:  133 BUGCHECK_P1: 1 BUGCHECK_P2: 1e00 BUGCHECK_P3: fffff8005dafb320 BUGCHECK_P4: 0 DPC_TIMEOUT_TYPE:  DPC_QUEUE_EXECUTION_TIMEOUT_EXCEEDED TRAP_FRAME:  fffff80061ab3cf0 -- (.trap 0xfffff80061ab3cf0) NOTE: The trap frame does not contain all registers. Some register values may be zeroed or incorrect. rax=fffff8005d198500 rbx=0000000000000000 rcx=0000000000001882 rdx=0000000000001882 rsi=0000000000000000 rdi=0000000000000000 rip=fffff8005d1985b9 rsp=fffff80061ab3e88 rbp=ffffbb8c1c4ba010  r8=fffff80061ab3f00  r9=0000000000000001 r10=fffff8005d1985b0 r11=0000000000000000 r12=0000000000000000 r13=0000000000000000 r14=0000000000000000 r15=0000000000000000 iopl=0         nv up ei pl zr na po nc nt!HalpAcpiPmRegisterReadPort 0x9: fffff800`5d1985b9 418800          mov     byte ptr [r8],al ds:fffff800`61ab3f00=00 Resetting default scope BLACKBOXBSD: 1 (!blackboxbsd) BLACKBOXNTFS: 1 (!blackboxntfs) BLACKBOXPNP: 1 (!blackboxpnp) BLACKBOXWINLOGON: 1 PROCESS_NAME:  System STACK_TEXT:   fffff800`61ab3b08 fffff800`5d259782     : 00000000`00000133 00000000`00000001 00000000`00001e00 fffff800`5dafb320 : nt!KeBugCheckEx fffff800`61ab3b10 fffff800`5d0d2973     : 00003630`b1a66f06 fffff800`5942f180 00000000`00000000 fffff800`5942f180 : nt!KeAccumulateTicks 0x1845b2 fffff800`61ab3b70 fffff800`5d0d245a     : fffff800`5daf38c0 fffff800`61ab3d70 00000000`00000000 00000000`00000010 : nt!KeClockInterruptNotify 0x453 fffff800`61ab3c20 fffff800`5d008a45     : fffff800`5daf38c0 00000000`00000000 00000000`0000000b fffff800`5d1faa4a : nt!HalpTimerClockIpiRoutine 0x1a fffff800`61ab3c50 fffff800`5d1faa4a     : fffff800`61ab3d70 fffff800`5daf38c0 00003630`b1a5ca70 ffffbb8c`26395000 : nt!KiCallInterruptServiceRoutine 0xa5 fffff800`61ab3ca0 fffff800`5d1fafb7     : 00000000`00000000 00000000`00000000 00003630`b19dc0a4 fffff800`8195e131 : nt!KiInterruptSubDispatchNoLockNoEtw 0xfa fffff800`61ab3cf0 fffff800`5d1985b9     : fffff800`5d197b89 00000000`00000010 ffffbb8c`1c6fb000 ffffbb8c`1c8d9310 : nt!KiInterruptDispatchNoLockNoEtw 0x37 fffff800`61ab3e88 fffff800`5d197b89     : 00000000`00000010 ffffbb8c`1c6fb000 ffffbb8c`1c8d9310 00000000`000002c8 : nt!HalpAcpiPmRegisterReadPort 0x9 fffff800`61ab3e90 fffff800`6014680a     : 00000000`00000002 ffffcf01`bb5b9280 fffff800`61ab3f98 00000000`00000f43 : nt!HalpAcpiPmRegisterRead 0x39 fffff800`61ab3ec0 fffff800`60145d84     : 00000000`00000000 ffffcf01`bb5b9dc0 00000000`00000f43 fffff800`00400a02 : ACPI!ACPIReadGpeStatusRegister 0x66 fffff800`61ab3f00 fffff800`5d008a45     : ffffcf01`bb5b9dc0 ffffbb8c`1cff0d70 ffffcf01`bb5b9e70 ffff3ace`b139024f : ACPI!ACPIInterruptServiceRoutine 0x54 fffff800`61ab3f40 fffff800`5d1fa7cf     : fffff800`61aa4510 ffffcf01`bb5b9dc0 000035df`8edcb305 00003630`b1a5c6a4 : nt!KiCallInterruptServiceRoutine 0xa5 fffff800`61ab3f90 fffff800`5d1faa97     : 00000000`00000003 fffff800`5d031b79 00000000`00000000 00000039`9d32c5b1 : nt!KiInterruptSubDispatch 0x11f fffff800`61aa4490 fffff800`5d1985b9     : fffff800`5d197b89 00000000`00000007 00000000`00000000 00000003`01010000 : nt!KiInterruptDispatch 0x37 fffff800`61aa4628 fffff800`5d197b89     : 00000000`00000007 00000000`00000000 00000003`01010000 fffffff6`00000002 : nt!HalpAcpiPmRegisterReadPort 0x9 fffff800`61aa4630 fffff800`6014680a     : 00000000`00000003 00000000`00000007 00000000`00000003 00000039`9d8828de : nt!HalpAcpiPmRegisterRead 0x39 fffff800`61aa4660 fffff800`601465a4     : 00000000`80010000 ffffbb8c`266970f0 00000000`00000000 00000000`00000001 : ACPI!ACPIReadGpeStatusRegister 0x66 fffff800`61aa46a0 fffff800`60145d01     : 00000000`80010000 ffffbb8c`1c4ba010 00000000`80010000 00000000`00000000 : ACPI!ACPIInterruptDispatchEvents 0x5c fffff800`61aa4730 fffff800`5d03489e     : fffff800`59432240 fffff800`61aa4860 fffff800`61aa4a20 fffff800`5942f180 : ACPI!ACPIInterruptServiceRoutineDPC 0xb1 fffff800`61aa4760 fffff800`5d033b84     : 00000000`00000000 00000000`00000000 00000000`00140001 00000000`00000000 : nt!KiExecuteAllDpcs 0x30e fffff800`61aa48d0 fffff800`5d1fcb3e     : 00000000`00000000 fffff800`5942f180 fffff800`5db27a00 ffffbb8c`33d94080 : nt!KiRetireDpcList 0x1f4 fffff800`61aa4b60 00000000`00000000     : fffff800`61aa5000 fffff800`61a9e000 00000000`00000000 00000000`00000000 : nt!KiIdleLoop 0x9e SYMBOL_NAME:  ACPI!ACPIReadGpeStatusRegister 66 MODULE_NAME: ACPI IMAGE_NAME:  ACPI.sys STACK_COMMAND:  .cxr; .ecxr ; kb BUCKET_ID_FUNC_OFFSET:  66 FAILURE_BUCKET_ID:  0x133_ISR_ACPI!ACPIReadGpeStatusRegister OS_VERSION:  10.0.19041.1 BUILDLAB_STR:  vb_release OSPLATFORM_TYPE:  x64 OSNAME:  Windows 10 FAILURE_ID_HASH:  {9524459d-2f22-efe5-b0c9-f824c586f42c} Followup:     MachineOwner ---------

欢迎访问本站!。若是有超频,降压等,建议恢复正常,xmp也关闭。然后到电脑品牌的官网更新一下bios,覆盖安装一下芯片组驱动,显卡驱动,声卡驱动,网卡驱动,请勿使用第三方的驱动安装程序。完成后执行一下干净启动,排除其他干扰:https://support.microsoft.com/zh-cn/help/929135.先卸载设备中全部的第三方反病毒软件与系统优化软件(例如360、联想电脑管家、360桌面、腾讯电脑管家、腾讯桌面、鲁大师,代理,加速器,虚拟机等)。然后鼠标右键单击开始菜单→运行(RUN)→输入:msconfig(按下Enter键)点击上面的“服务”勾选下面的“隐藏所有Microsoft服务”(请务必勾选)点击“全部禁用”。然后鼠标右键单击开始菜单→任务管理器,(点击底部“详细信息”),点击顶部”启动”,鼠标右键单击“状态”显示为“已启动”的项,选择“禁用”。(禁用所有启动项。)然后鼠标右键单击开始按钮(图标的按钮)→"WindowsPowerShell(I)(管理员)(A)”→输入:(WIndows11中可能显示Windows终端(管理员))sfc/SCANNOW(按下Enter键)Dism/Online/Cleanup-Image/ScanHealth(按下Enter键)Dism/Online/Cleanup-Image/CheckHealth(按下Enter键)DISM/Online/Cleanup-image/RestoreHealth(按下Enter键)完成后重启电脑,再次输入:sfc/SCANNOW(按下Enter键)看下是否有改善。


欢迎访问本站!。若是有超频,降压等,建议恢复正常,xmp也关闭。然后到电脑品牌的官网更新一下bios,覆盖安装一下芯片组驱动,显卡驱动,声卡驱动,网卡驱动,请勿使用第三方的驱动安装程序。完成后执行一下干净启动,排除其他干扰:https://support.microsoft.com/zh-cn/help/929135.先卸载设备中全部的第三方反病毒软件与系统优化软件(例如360、联想电脑管家、360桌面、腾讯电脑管家、腾讯桌面、鲁大师,代理,加速器,虚拟机等)。然后鼠标右键单击开始菜单→运行(RUN)→输入:msconfig(按下Enter键)点击上面的“服务”勾选下面的“隐藏所有Microsoft服务”(请务必勾选)点击“全部禁用”。然后鼠标右键单击开始菜单→任务管理器,(点击底部“详细信息”),点击顶部”启动”,鼠标右键单击“状态”显示为“已启动”的项,选择“禁用”。(禁用所有启动项。)然后鼠标右键单击开始按钮(图标的按钮)→"WindowsPowerShell(I)(管理员)(A)”→输入:(WIndows11中可能显示Windows终端(管理员))sfc/SCANNOW(按下Enter键)Dism/Online/Cleanup-Image/ScanHealth(按下Enter键)Dism/Online/Cleanup-Image/CheckHealth(按下Enter键)DISM/Online/Cleanup-image/RestoreHealth(按下Enter键)完成后重启电脑,再次输入:sfc/SCANNOW(按下Enter键)看下是否有改善。


感觉不太会弄此是否有帮助?是否抱歉,这没有帮助。太棒了!感谢你的反馈。你对此的满意度如何?感谢你的反馈,它能帮助改进网站。你对此的满意度如何?感谢你的反馈。


点赞(75) 打赏

微信小程序

微信扫一扫体验

立即
投稿

微信公众账号

微信扫一扫加关注

发表
评论
返回
顶部