Microsoft (R) Windows Debugger Version 10.0.22473.1005 AMD64 Copyright (c) Microsoft Corporation. All rights reserved. Loading Dump File [C:\Windows\Minidump\012822-10562-01.dmp] Mini Kernel Dump File: Only registers and stack trace are available Symbol search path is: srv* Executable search path is: Windows 10 Kernel Version 19041 MP (16 procs) Free x64 Product: WinNt, suite: TerminalServer SingleUserTS Personal Machine Name: Kernel base = 0xfffff801`55400000 PsLoadedModuleList = 0xfffff801`5602a2b0 Debug session time: Fri Jan 28 15:31:23.762 2022 (UTC 8:00) System Uptime: 0 days 20:50:09.478 Loading Kernel Symbols .. Press ctrl-c (cdb, kd, ntsd) or ctrl-break (windbg) to abort symbol loads that take too long. Run !sym noisy before .reload to track down problems loading symbols. ............................................................. ................................................................ ................................................................ ........................ Loading User Symbols Loading unloaded module list ................. For analysis of this file, run !analyze -v nt!KeBugCheckEx: fffff801`557f72e0 48894c2408 mov qword ptr [rsp 8],rcx ss:0018:ffff8981`fa077e20=0000000000000133 7: kd> !analyze -v ******************************************************************************* * * * Bugcheck Analysis * * * ******************************************************************************* DPC_WATCHDOG_VIOLATION (133) The DPC watchdog detected a prolonged run time at an IRQL of DISPATCH_LEVEL or above. Arguments: Arg1: 0000000000000001, The system cumulatively spent an extended period of time at DISPATCH_LEVEL or above. The offending component can usually be identified with a stack trace. Arg2: 0000000000001e00, The watchdog period. Arg3: fffff801560fb320, cast to nt!DPC_WATCHDOG_GLOBAL_TRIAGE_BLOCK, which contains additional information regarding the cumulative timeout Arg4: 0000000000000000 Debugging Details: ------------------ ************************************************************************* *** *** *** *** *** Either you specified an unqualified symbol, or your debugger *** *** doesn't have full symbol information. Unqualified symbol *** *** resolution is turned off by default. Please either specify a *** *** fully qualified symbol module!symbolname, or enable resolution *** *** of unqualified symbols by typing ".symopt- 100". Note that *** *** enabling unqualified symbol resolution with network symbol *** *** server shares in the symbol path may cause the debugger to *** *** appear to hang for long periods of time when an incorrect *** *** symbol name is typed or the network symbol server is down. *** *** *** *** For some commands to work properly, your symbol path *** *** must point to .pdb files that have full type information. *** *** *** *** Certain .pdb files (such as the public OS symbols) do not *** *** contain the required information. Contact the group that *** *** provided you with these symbols if you need this command to *** *** work. *** *** *** *** Type referenced: TickPeriods *** *** *** ************************************************************************* KEY_VALUES_STRING: 1 Key : Analysis.CPU.mSec Value: 2156 Key : Analysis.DebugAnalysisManager Value: Create Key : Analysis.Elapsed.mSec Value: 15757 Key : Analysis.Init.CPU.mSec Value: 452 Key : Analysis.Init.Elapsed.mSec Value: 43154 Key : Analysis.Memory.CommitPeak.Mb Value: 85 FILE_IN_CAB: 012822-10562-01.dmp DUMP_FILE_ATTRIBUTES: 0x8 Kernel Generated Triage Dump BUGCHECK_CODE: 133 BUGCHECK_P1: 1 BUGCHECK_P2: 1e00 BUGCHECK_P3: fffff801560fb320 BUGCHECK_P4: 0 DPC_TIMEOUT_TYPE: DPC_QUEUE_EXECUTION_TIMEOUT_EXCEEDED CUSTOMER_CRASH_COUNT: 1 PROCESS_NAME: MsMpEng.exe STACK_TEXT: ffff8981`fa077e18 fffff801`5581f67e : 00000000`00000133 00000000`00000001 00000000`00001e00 fffff801`560fb320 : nt!KeBugCheckEx ffff8981`fa077e20 fffff801`55616953 : 00002508`a16b08e8 ffff8981`fa05e180 00000000`00000000 ffff8981`fa05e180 : nt!KeAccumulateTicks 0x2064ce ffff8981`fa077e80 fffff801`5561643a : ffffd60a`51127ec0 fffff608`9fad6720 00000000`00000000 fffffe01`4cee1cb0 : nt!KeClockInterruptNotify 0x453 ffff8981`fa077f30 fffff801`556de195 : ffffd60a`51127ec0 fffff801`55752587 00000000`00000000 00000000`00000000 : nt!HalpTimerClockIpiRoutine 0x1a ffff8981`fa077f60 fffff801`557f8d8a : fffff608`9fad6720 ffffd60a`51127ec0 ffffd60a`64a9e700 00000000`00000000 : nt!KiCallInterruptServiceRoutine 0xa5 ffff8981`fa077fb0 fffff801`557f92f7 : 00000000`00000800 fffff801`557f937f 00000000`00000800 00000000`00000004 : nt!KiInterruptSubDispatchNoLockNoEtw 0xfa fffff608`9fad66a0 fffff801`5562a870 : fffff801`55653d72 ffff8981`fa05e180 fffff801`5563a625 00000000`00000000 : nt!KiInterruptDispatchNoLockNoEtw 0x37 fffff608`9fad6838 fffff801`55653d72 : ffff8981`fa05e180 fffff801`5563a625 00000000`00000000 fffff801`560515b0 : nt!MiInvalidPteConforms fffff608`9fad6840 fffff801`5565384f : fffffe01`4cee1cb0 00000000`057f8730 fffff608`9fad69c0 00000000`00000000 : nt!MiLockTransitionLeafPage 0x5a fffff608`9fad6890 fffff801`5564134d : 8a000009`00000002 00000000`00000004 06b052fc`00000000 00000000`00000000 : nt!MiTryDeleteTransitionPte 0x1f fffff608`9fad68c0 fffff801`55641d3e : 00000000`00000000 fffff608`9fad6fd0 fffffe01`4cee2000 fffff608`9fad6f20 : nt!MiDeletePteRun 0x157d fffff608`9fad6ad0 fffff801`5569ea4d : 00000000`00000000 ffffd60a`64a9e700 fffff608`9fad6f20 fffffe01`4cee1fb8 : nt!MiDeleteVaTail 0x6e fffff608`9fad6b00 fffff801`5569e66b : fffffe7f`00000000 ffffd60a`64a9e700 fffff608`00000000 fffff608`9fad6f70 : nt!MiWalkPageTablesRecursively 0xc6d fffff608`9fad6ba0 fffff801`5569e66b : fffffe7f`3f805338 ffffd60a`64a9e700 fffff608`00000001 fffff608`9fad6f80 : nt!MiWalkPageTablesRecursively 0x88b fffff608`9fad6c40 fffff801`5569e66b : fffffe7f`3f805000 ffffd60a`64a9e700 fffff608`00000002 fffff608`9fad6f90 : nt!MiWalkPageTablesRecursively 0x88b fffff608`9fad6ce0 fffff801`55604f4b : 00000001`1eefe107 ffffd60a`64a9e700 00000000`00000003 fffff608`9fad6fa0 : nt!MiWalkPageTablesRecursively 0x88b fffff608`9fad6d80 fffff801`55642961 : fffff608`9fad6f20 ffffd60a`00000000 00000000`00000002 ffffd60a`00000000 : nt!MiWalkPageTables 0x36b fffff608`9fad6e80 fffff801`55612aa0 : 00000000`00000001 fffff608`00000000 ffffd60a`64a9e550 ffffd60a`66fa4080 : nt!MiDeletePagablePteRange 0x4f1 fffff608`9fad7190 fffff801`55a01149 : 00000000`00000000 00000000`00000000 00000000`00000001 00000000`00000000 : nt!MiDeleteVad 0x360 fffff608`9fad72a0 fffff801`55a00f22 : ffffd60a`68f242a0 00000000`00000000 ffffd60a`64a9e080 00000000`00000000 : nt!MiUnmapVad 0x49 fffff608`9fad72d0 fffff801`55a00d99 : ffff0acc`4cd2ea93 000000e8`9d9fb150 00000299`db945100 00000000`00000000 : nt!MiUnmapViewOfSection 0x152 fffff608`9fad73b0 fffff801`55808cb5 : ffffd60a`66fa4080 00000299`dbb20000 fffff608`00000000 ffffd60a`64a9e080 : nt!NtUnmapViewOfSectionEx 0x99 fffff608`9fad7400 00007ffd`2a5b06e4 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd 0x25 000000e8`9d9fb0b8 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffd`2a5b06e4 SYMBOL_NAME: nt!KeAccumulateTicks 2064ce MODULE_NAME: nt IMAGE_NAME: ntkrnlmp.exe IMAGE_VERSION: 10.0.19041.1466 STACK_COMMAND: .cxr; .ecxr ; kb BUCKET_ID_FUNC_OFFSET: 2064ce FAILURE_BUCKET_ID: 0x133_ISR_nt!KeAccumulateTicks OSPLATFORM_TYPE: x64 OSNAME: Windows 10 FAILURE_ID_HASH: {65350307-c3b9-f4b5-8829-4d27e9ff9b06} Followup: MachineOwner ---------

HiIamDave,Iwillhelpyouwiththis.PleasechecktoseeifyourPCisproducinganyminidumpfiles,Iwillcheckthosetoseeiftheyprovideanyinsightintoapotentialcauseofthesystemcrashes.PleaseNote,IcannotdownloadfromBaiduCloudDrive,pleaseuseadifferentCloudServicefortheupload.OpenWindowsFileExplorer.NavigatetoC:\Windows\MinidumpCopyanyminidumpfilesontoyourDesktop,thenzipthoseup.UploadthezipfiletotheCloud(OneDrive,DropBox.etc.),thenchoosetosharethoseandgetasharelink.Thenpostthelinkheretothezipfile,sowecantakealookforyou.


点赞(82) 打赏

微信小程序

微信扫一扫体验

立即
投稿

微信公众账号

微信扫一扫加关注

发表
评论
返回
顶部