Microsoft (R) Windows Debugger Version 10.0.25136.1001 AMD64 Copyright (c) Microsoft Corporation. All rights reserved. Loading Dump File [C:\WINDOWS\MEMORY.DMP] Kernel Bitmap Dump File: Kernel address space is available, User address space may not be available. Symbol search path is: srv* Executable search path is: Windows 10 Kernel Version 19041 MP (8 procs) Free x64 Product: WinNt, suite: TerminalServer SingleUserTS Personal Edition build lab: 19041.1.amd64fre.vb_release.191206-1406 Machine Name: Kernel base = 0xfffff806`10400000 PsLoadedModuleList = 0xfffff806`1102a2b0 Debug session time: Tue Jun 28 13:16:38.905 2022 (UTC 8:00) System Uptime: 0 days 4:31:21.719 Loading Kernel Symbols ............................................................... ................................................................ ................................................................ ..................................................... Loading User Symbols PEB is paged out (Peb.Ldr = 0000000a`397b9018). Type ".hh dbgerr001" for details Loading unloaded module list ....................... For analysis of this file, run !analyze -v nt!KeBugCheckEx: fffff806`107f7dd0 48894c2408 mov qword ptr [rsp 8],rcx ss:0018:ffffde80`449ffe20=0000000000000133 2: kd> !analyze -v ******************************************************************************* * * * Bugcheck Analysis * * * ******************************************************************************* DPC_WATCHDOG_VIOLATION (133) The DPC watchdog detected a prolonged run time at an IRQL of DISPATCH_LEVEL or above. Arguments: Arg1: 0000000000000001, The system cumulatively spent an extended period of time at DISPATCH_LEVEL or above. The offending component can usually be identified with a stack trace. Arg2: 0000000000001e00, The watchdog period. Arg3: fffff806110fb320, cast to nt!DPC_WATCHDOG_GLOBAL_TRIAGE_BLOCK, which contains additional information regarding the cumulative timeout Arg4: 0000000000000000 Debugging Details: ------------------ ************************************************************************* *** *** *** *** *** Either you specified an unqualified symbol, or your debugger *** *** doesn't have full symbol information. Unqualified symbol *** *** resolution is turned off by default. Please either specify a *** *** fully qualified symbol module!symbolname, or enable resolution *** *** of unqualified symbols by typing ".symopt- 100". Note that *** *** enabling unqualified symbol resolution with network symbol *** *** server shares in the symbol path may cause the debugger to *** *** appear to hang for long periods of time when an incorrect *** *** symbol name is typed or the network symbol server is down. *** *** *** *** For some commands to work properly, your symbol path *** *** must point to .pdb files that have full type information. *** *** *** *** Certain .pdb files (such as the public OS symbols) do not *** *** contain the required information. Contact the group that *** *** provided you with these symbols if you need this command to *** *** work. *** *** *** *** Type referenced: TickPeriods *** *** *** ************************************************************************* KEY_VALUES_STRING: 1 Key : Analysis.CPU.mSec Value: 3280 Key : Analysis.DebugAnalysisManager Value: Create Key : Analysis.Elapsed.mSec Value: 8297 Key : Analysis.Init.CPU.mSec Value: 1062 Key : Analysis.Init.Elapsed.mSec Value: 45227 Key : Analysis.Memory.CommitPeak.Mb Value: 93 Key : Bugcheck.Code.DumpHeader Value: 0x133 Key : Bugcheck.Code.KiBugCheckData Value: 0x133 Key : Bugcheck.Code.Register Value: 0x133 Key : WER.OS.Branch Value: vb_release Key : WER.OS.Timestamp Value: 2019-12-06T14:06:00Z Key : WER.OS.Version Value: 10.0.19041.1 FILE_IN_CAB: MEMORY.DMP BUGCHECK_CODE: 133 BUGCHECK_P1: 1 BUGCHECK_P2: 1e00 BUGCHECK_P3: fffff806110fb320 BUGCHECK_P4: 0 DPC_TIMEOUT_TYPE: DPC_QUEUE_EXECUTION_TIMEOUT_EXCEEDED TRAP_FRAME: fffff607b09b83d0 -- (.trap 0xfffff607b09b83d0) NOTE: The trap frame does not contain all registers. Some register values may be zeroed or incorrect. rax=0000000000000001 rbx=0000000000000000 rcx=0000200000000000 rdx=0000000018a79994 rsi=0000000000000000 rdi=0000000000000000 rip=fffff80610675666 rsp=fffff607b09b8560 rbp=ffffd08006ef4f30 r8=ffffd08000000000 r9=ffffd08000000028 r10=0000000fffffffff r11=0004000000000000 r12=0000000000000000 r13=0000000000000000 r14=0000000000000000 r15=0000000000000000 iopl=0 nv up ei pl nz na pe nc nt!MiDeleteSubsectionPages 0x1f6: fffff806`10675666 488bc3 mov rax,rbx Resetting default scope BLACKBOXBSD: 1 (!blackboxbsd) BLACKBOXNTFS: 1 (!blackboxntfs) BLACKBOXPNP: 1 (!blackboxpnp) BLACKBOXWINLOGON: 1 PROCESS_NAME: yuzu.exe STACK_TEXT: ffffde80`449ffe18 fffff806`10837070 : 00000000`00000133 00000000`00000001 00000000`00001e00 fffff806`110fb320 : nt!KeBugCheckEx ffffde80`449ffe20 fffff806`1065f203 : 00002392`b9340352 ffffde80`449a9180 00000000`00000000 ffffde80`449a9180 : nt!KeAccumulateTicks 0x1d5610 ffffde80`449ffe80 fffff806`1065ecea : ffff9a8d`c43030e0 fffff607`b09b8450 00000000`00000000 ffff9a8d`efd9bc00 : nt!KeClockInterruptNotify 0x453 ffffde80`449fff30 fffff806`1062d885 : ffff9a8d`c43030e0 fffff806`107479b7 00000000`00000000 00000000`00000000 : nt!HalpTimerClockIpiRoutine 0x1a ffffde80`449fff60 fffff806`107f987a : fffff607`b09b8450 ffff9a8d`c43030e0 00000000`00000000 00000000`00000000 : nt!KiCallInterruptServiceRoutine 0xa5 ffffde80`449fffb0 fffff806`107f9de7 : 00002041`beeee880 ffffd080`0043ac70 00000000`00000000 00001f80`006b022a : nt!KiInterruptSubDispatchNoLockNoEtw 0xfa fffff607`b09b83d0 fffff806`10675666 : 00000000`00000000 fffff806`11050c00 00000000`00000011 80000002`00000001 : nt!KiInterruptDispatchNoLockNoEtw 0x37 fffff607`b09b8560 fffff806`106cf5da : ffff9a8d`efd9bc80 fffff607`b09b8688 ffff870b`b0400300 02100050`00000000 : nt!MiDeleteSubsectionPages 0x1f6 fffff607`b09b8620 fffff806`10a38c6e : 00000000`00002001 00000000`00000000 fffff806`11050c00 00000000`00002001 : nt!MiDeleteSegmentPages 0x56 fffff607`b09b8680 fffff806`10695c9a : 00000000`00000000 00000000`00000002 00000000`00000000 00000000`00000000 : nt!MiSegmentDelete 0x92 fffff607`b09b86d0 fffff806`10695a82 : 00000000`00000001 00000000`00000001 fffff607`b09b8939 ffff870b`c6347aa0 : nt!MiCheckControlArea 0x1fa fffff607`b09b8750 fffff806`10a1f2d3 : ffff9a8d`efd9bc00 00000000`00000000 ffff870b`c3b5b6b0 01000000`00100000 : nt!MiDereferenceControlAreaBySection 0x2a fffff607`b09b8780 fffff806`10a0c0d0 : ffff870b`d15a78a0 fffff607`b09b8939 00000000`00000000 ffff9a8d`c42debc0 : nt!MiSectionDelete 0x83 fffff607`b09b87b0 fffff806`10650c47 : 00000000`00000000 00000000`00000000 fffff607`b09b8939 ffff870b`d15a78d0 : nt!ObpRemoveObjectRoutine 0x80 fffff607`b09b8810 fffff806`10a14a29 : ffff870b`d15a78a0 00000000`00000000 ffff870b`b8af5130 ffff870b`b8af5130 : nt!ObfDereferenceObjectWithTag 0xc7 fffff607`b09b8850 fffff806`10a1885c : 00000000`0000084c fffff806`10a1a885 00000000`00000000 fffff806`109de89a : nt!ObCloseHandleTableEntry 0x6c9 fffff607`b09b8990 fffff806`108097b5 : ffff9a8d`e82ea000 00000147`00000001 fffff607`b09b8a80 fffff607`b09b8a80 : nt!NtClose 0xec fffff607`b09b8a00 00007ffb`4eb2cf24 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd 0x25 0000000a`398ff6d8 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffb`4eb2cf24 SYMBOL_NAME: nt!KeAccumulateTicks 1d5610 MODULE_NAME: nt IMAGE_NAME: ntkrnlmp.exe STACK_COMMAND: .cxr; .ecxr ; kb BUCKET_ID_FUNC_OFFSET: 1d5610 FAILURE_BUCKET_ID: 0x133_ISR_nt!KeAccumulateTicks OS_VERSION: 10.0.19041.1 BUILDLAB_STR: vb_release OSPLATFORM_TYPE: x64 OSNAME: Windows 10 FAILURE_ID_HASH: {65350307-c3b9-f4b5-8829-4d27e9ff9b06} Followup: MachineOwner ---------

嗨,田中庄司,保罗,来帮助你解决你的问题的。内存转储文件仅指示系统内核驱动程序“ntkrnlmp.exe”。由于它是一个系统文件,这意味着其他东西导致它出现故障。它可以是硬件、软件或驱动程序。你能检查一下你是否有我也可以分析的小型转储文件吗?1.打开Windows文件资源管理器2.转到C:\Windows\Minidump3.压缩这些文件4.将zip文件上传到云端(OneDriveDropBox..等)。5.然后在这里分享链接。谢谢。此是否有帮助?是否抱歉,这没有帮助。太棒了!感谢你的反馈。你对此的满意度如何?感谢你的反馈,它能帮助改进网站。你对此的满意度如何?感谢你的反馈。


点赞(49) 打赏

微信小程序

微信扫一扫体验

立即
投稿

微信公众账号

微信扫一扫加关注

发表
评论
返回
顶部