Microsoft (R) Windows Debugger Version 10.0.25136.1001 AMD64 Copyright (c) Microsoft Corporation. All rights reserved. Loading Dump File [C:\Windows\Minidump\070422-7812-01.dmp] Mini Kernel Dump File: Only registers and stack trace are available Symbol search path is: srv* Executable search path is: Windows 10 Kernel Version 19041 MP (8 procs) Free x64 Product: WinNt, suite: TerminalServer SingleUserTS Machine Name: Kernel base = 0xfffff804`69400000 PsLoadedModuleList = 0xfffff804`6a02a2b0 Debug session time: Mon Jul 4 16:40:08.112 2022 (UTC 8:00) System Uptime: 0 days 0:09:25.812 Loading Kernel Symbols .. Press ctrl-c (cdb, kd, ntsd) or ctrl-break (windbg) to abort symbol loads that take too long. Run !sym noisy before .reload to track down problems loading symbols. ............................................................. ................................................................ ................................................................ .......................... Loading User Symbols Loading unloaded module list ....... For analysis of this file, run !analyze -v nt!KeBugCheckEx: fffff804`697f7d60 48894c2408 mov qword ptr [rsp 8],rcx ss:ffffe401`78579e20=0000000000000133 5: kd> !analyze -v ******************************************************************************* * * * Bugcheck Analysis * * * ******************************************************************************* DPC_WATCHDOG_VIOLATION (133) The DPC watchdog detected a prolonged run time at an IRQL of DISPATCH_LEVEL or above. Arguments: Arg1: 0000000000000001, The system cumulatively spent an extended period of time at DISPATCH_LEVEL or above. The offending component can usually be identified with a stack trace. Arg2: 0000000000001e00, The watchdog period. Arg3: fffff8046a0fb320, cast to nt!DPC_WATCHDOG_GLOBAL_TRIAGE_BLOCK, which contains additional information regarding the cumulative timeout Arg4: 0000000000000000 Debugging Details: ------------------ ************************************************************************* *** *** *** *** *** Either you specified an unqualified symbol, or your debugger *** *** doesn't have full symbol information. Unqualified symbol *** *** resolution is turned off by default. Please either specify a *** *** fully qualified symbol module!symbolname, or enable resolution *** *** of unqualified symbols by typing ".symopt- 100". Note that *** *** enabling unqualified symbol resolution with network symbol *** *** server shares in the symbol path may cause the debugger to *** *** appear to hang for long periods of time when an incorrect *** *** symbol name is typed or the network symbol server is down. *** *** *** *** For some commands to work properly, your symbol path *** *** must point to .pdb files that have full type information. *** *** *** *** Certain .pdb files (such as the public OS symbols) do not *** *** contain the required information. Contact the group that *** *** provided you with these symbols if you need this command to *** *** work. *** *** *** *** Type referenced: TickPeriods *** *** *** ************************************************************************* KEY_VALUES_STRING: 1 Key : Analysis.CPU.mSec Value: 2171 Key : Analysis.DebugAnalysisManager Value: Create Key : Analysis.Elapsed.mSec Value: 2181 Key : Analysis.Init.CPU.mSec Value: 655 Key : Analysis.Init.Elapsed.mSec Value: 385973 Key : Analysis.Memory.CommitPeak.Mb Value: 135 Key : Bugcheck.Code.DumpHeader Value: 0x133 Key : Bugcheck.Code.Register Value: 0x133 Key : Dump.Attributes.AsUlong Value: 8 Key : Dump.Attributes.KernelGeneratedTriageDump Value: 1 FILE_IN_CAB: 070422-7812-01.dmp DUMP_FILE_ATTRIBUTES: 0x8 Kernel Generated Triage Dump BUGCHECK_CODE: 133 BUGCHECK_P1: 1 BUGCHECK_P2: 1e00 BUGCHECK_P3: fffff8046a0fb320 BUGCHECK_P4: 0 DPC_TIMEOUT_TYPE: DPC_QUEUE_EXECUTION_TIMEOUT_EXCEEDED BLACKBOXACPI: 1 (!blackboxacpi) BLACKBOXBSD: 1 (!blackboxbsd) BLACKBOXNTFS: 1 (!blackboxntfs) BLACKBOXPNP: 1 (!blackboxpnp) BLACKBOXWINLOGON: 1 CUSTOMER_CRASH_COUNT: 1 PROCESS_NAME: System STACK_TEXT: ffffe401`78579e18 fffff804`69836f70 : 00000000`00000133 00000000`00000001 00000000`00001e00 fffff804`6a0fb320 : nt!KeBugCheckEx ffffe401`78579e20 fffff804`6965f203 : 0000023e`64ba54a7 ffffe401`78560180 00000000`00000000 ffffe401`78560180 : nt!KeAccumulateTicks 0x1d5510 ffffe401`78579e80 fffff804`6965ecea : ffff9a8a`b8092600 ffffb00f`51aa5300 00000000`00000000 00000000`00000081 : nt!KeClockInterruptNotify 0x453 ffffe401`78579f30 fffff804`6962d885 : ffff9a8a`b8092600 00000000`00000000 00000000`00000000 ffff5e73`8293253b : nt!HalpTimerClockIpiRoutine 0x1a ffffe401`78579f60 fffff804`697f980a : ffffb00f`51aa5300 ffff9a8a`b8092600 ffff9a8a`c20cc1f0 00000000`00000000 : nt!KiCallInterruptServiceRoutine 0xa5 ffffe401`78579fb0 fffff804`697f9d77 : 00000000`e0c5322a 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiInterruptSubDispatchNoLockNoEtw 0xfa ffffb00f`51aa5280 fffff804`6976200c : ffffb00f`51aa5490 ffff9a8a`bb22b9b8 ffff9a8a`bb22b9b8 fffff804`6d59661a : nt!KiInterruptDispatchNoLockNoEtw 0x37 ffffb00f`51aa5410 fffff804`69761fd8 : fffff804`6d612bd8 ffffe401`78560180 00000001`09ba2db6 00000000`00000000 : nt!KxWaitForSpinLockAndAcquire 0x2c ffffb00f`51aa5440 fffff804`6d598acd : fffff804`6d599cf0 00000000`00000000 ffff9a8a`c20cc4c8 ffff9a8a`c20cc1f0 : nt!KeAcquireSpinLockRaiseToDpc 0x88 ffffb00f`51aa5470 fffff804`6d5b2bb7 : 00000000`00000000 fffff804`4d524648 ffff9a8a`c20cc010 00000000`00000000 : ACPI!HeapAlloc 0x5d ffffb00f`51aa54e0 fffff804`6d5b0fe2 : ffff9a8a`bb228970 ffff9a8a`ba8520c8 ffff9a8a`c20cc090 fffff804`6d598b63 : ACPI!PushFrame 0x2f ffffb00f`51aa5520 fffff804`6d5b10a3 : ffffb00f`51aa56b0 00000000`00000000 ffff9a8a`ba852118 ffff9a8a`c20cc010 : ACPI!ExprOp2_64 0x2d2 ffffb00f`51aa5580 fffff804`6d597388 : 00000000`00000003 00000000`4d524648 00000000`00000002 ffff9a8a`c20cc1f0 : ACPI!ExprOp2 0x43 ffffb00f`51aa55b0 fffff804`6d594c00 : ffff9a8a`c20cc010 ffffb00f`51aa59a9 ffff9a8a`c20cc010 ffff9a8a`c20cc198 : ACPI!ParseTerm 0x2c8 ffffb00f`51aa58e0 fffff804`6d594685 : ffff9a8a`b83f3000 ffff9a8a`c20cc010 00000000`00000000 00000000`0000003e : ACPI!RunContext 0x1f0 ffffb00f`51aa5a10 fffff804`6d5ba325 : ffff9a8a`c20cc010 00000000`00000080 ffff9a8a`c20cc010 00000000`00000124 : ACPI!InsertReadyQueue 0x2a5 ffffb00f`51aa5a70 fffff804`6d5b8c97 : ffff9a8a`c20cc010 00000000`00000000 00000000`00000000 ffffb00f`51a9cc00 : ACPI!RestartCtxtPassive 0x35 ffffb00f`51aa5aa0 fffff804`696eea75 : ffff9a8a`b8bfa040 fffff804`6d5b8b90 00000000`00000000 ffff9a8a`b8067040 : ACPI!ACPIWorkerThread 0x107 ffffb00f`51aa5b10 fffff804`697ff3b8 : ffffe401`784e6180 ffff9a8a`b8bfa040 fffff804`696eea20 00000000`00000000 : nt!PspSystemThreadStartup 0x55 ffffb00f`51aa5b60 00000000`00000000 : ffffb00f`51aa6000 ffffb00f`51a9f000 00000000`00000000 00000000`00000000 : nt!KiStartSystemThread 0x28 SYMBOL_NAME: ACPI!HeapAlloc 5d MODULE_NAME: ACPI IMAGE_NAME: ACPI.sys IMAGE_VERSION: 10.0.19041.1110 STACK_COMMAND: .cxr; .ecxr ; kb BUCKET_ID_FUNC_OFFSET: 5d FAILURE_BUCKET_ID: 0x133_ISR_ACPI!HeapAlloc OSPLATFORM_TYPE: x64 OSNAME: Windows 10 FAILURE_ID_HASH: {96368449-0628-7c68-dd5b-5ef1577f957f} Followup: MachineOwner ---------

HiIamDave,Iwillhelpyouwiththis.PleasechecktoseeifyourPCisproducinganyminidumpfiles,Iwillcheckthosetoseeiftheyprovideanyinsightintoapotentialcauseofthesystemcrashes.PleaseNote,IcannotdownloadfromBaiduCloudDrive,pleaseuseadifferentCloudServicefortheupload.OpenWindowsFileExplorer.NavigatetoC:\Windows\MinidumpCopyanyminidumpfilesontoyourDesktop,thenzipthoseup.UploadthezipfiletotheCloud(OneDrive,DropBox.etc.),thenchoosetosharethoseandgetasharelink.Thenpostthelinkheretothezipfile,sowecantakealookforyou.


点赞(17) 打赏

微信小程序

微信扫一扫体验

立即
投稿

微信公众账号

微信扫一扫加关注

发表
评论
返回
顶部