DPC_WATCHDOG_VIOLATION (133)The DPC watchdog detected a prolonged run time at an IRQL of DISPATCH_LEVELor above.Arguments:Arg1: 0000000000000001, The system cumulatively spent an extended period of time at DISPATCH_LEVEL or above. The offending component can usually be identified with a stack trace.Arg2: 0000000000001e00, The watchdog period.Arg3: 0000000000000000Arg4: 0000000000000000Debugging Details:------------------CUSTOMER_CRASH_COUNT: 1DEFAULT_BUCKET_ID: DRIVER_FAULT_SERVER_MINIDUMPBUGCHECK_STR: 0x133PROCESS_NAME: adb.exeCURRENT_IRQL: dLAST_CONTROL_TRANSFER: from fffff801171a5b2c to fffff80117165fa0STACK_TEXT: fffff801`189f8c98 fffff801`171a5b2c : 00000000`00000133 00000000`00000001 00000000`00001e00 00000000`00000000 : nt!KeBugCheckExfffff801`189f8ca0 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt! ?? ::FNODOBFM::`string' 0x2f67cSTACK_COMMAND: kbFOLLOWUP_IP: nt! ?? ::FNODOBFM::`string' 2f67cfffff801`171a5b2c cc int 3SYMBOL_STACK_INDEX: 1SYMBOL_NAME: nt! ?? ::FNODOBFM::`string' 2f67cFOLLOWUP_NAME: MachineOwnerMODULE_NAME: ntIMAGE_NAME: ntkrnlmp.exeDEBUG_FLR_IMAGE_TIMESTAMP: 53085af2FAILURE_BUCKET_ID: X64_0x133_nt!_??_::FNODOBFM::_string_ 2f67cBUCKET_ID: X64_0x133_nt!_??_::FNODOBFM::_string_ 2f67cFollowup: MachineOwner---------

Hi,I'mDyari.Thanksforreachingout.Iwillbehappytoassistyouinthisregard.KindlycheckC:\Windows\MinidumpandcopyavailableminidumpfilestothedesktopthensharethemviaOneDriveorGoogleDriveinordertobeanalyzedandindicatewhichfileiscausingthecrash.Regards,嗨,迪亚里。感谢您伸出援手。我很乐意在这方面为您提供帮助。请检查C:\Windows\Minidump并将可用的minidump文件复制到桌面,然后通过OneDriveGoogleDrive共享它们,以便分析并指出导致崩溃的文件。问候,


点赞(94) 打赏

微信小程序

微信扫一扫体验

立即
投稿

微信公众账号

微信扫一扫加关注

发表
评论
返回
顶部