******************************************************************************* * * * Bugcheck Analysis * * * ******************************************************************************* DPC_WATCHDOG_VIOLATION (133) The DPC watchdog detected a prolonged run time at an IRQL of DISPATCH_LEVEL or above. Arguments: Arg1: 0000000000000001, The system cumulatively spent an extended period of time at DISPATCH_LEVEL or above. The offending component can usually be identified with a stack trace. Arg2: 0000000000001e00, The watchdog period. Arg3: fffff8053f171358, cast to nt!DPC_WATCHDOG_GLOBAL_TRIAGE_BLOCK, which contains additional information regarding the cumulative timeout Arg4: 0000000000000000 Debugging Details: ------------------ ************************************************************************* *** *** *** *** *** Either you specified an unqualified symbol, or your debugger *** *** doesn't have full symbol information. Unqualified symbol *** *** resolution is turned off by default. Please either specify a *** *** fully qualified symbol module!symbolname, or enable resolution *** *** of unqualified symbols by typing ".symopt- 100". Note that *** *** enabling unqualified symbol resolution with network symbol *** *** server shares in the symbol path may cause the debugger to *** *** appear to hang for long periods of time when an incorrect *** *** symbol name is typed or the network symbol server is down. *** *** *** *** For some commands to work properly, your symbol path *** *** must point to .pdb files that have full type information. *** *** *** *** Certain .pdb files (such as the public OS symbols) do not *** *** contain the required information. Contact the group that *** *** provided you with these symbols if you need this command to *** *** work. *** *** *** *** Type referenced: TickPeriods *** *** *** ************************************************************************* KEY_VALUES_STRING: 1 Key : Analysis.CPU.mSec Value: 4671 Key : Analysis.DebugAnalysisManager Value: Create Key : Analysis.Elapsed.mSec Value: 15416 Key : Analysis.Init.CPU.mSec Value: 1171 Key : Analysis.Init.Elapsed.mSec Value: 13836 Key : Analysis.Memory.CommitPeak.Mb Value: 92 Key : Bugcheck.Code.DumpHeader Value: 0x133 Key : Bugcheck.Code.Register Value: 0x133 Key : Dump.Attributes.AsUlong Value: 8 Key : Dump.Attributes.KernelGeneratedTriageDump Value: 1 FILE_IN_CAB: 072622-25828-01.dmp DUMP_FILE_ATTRIBUTES: 0x8 Kernel Generated Triage Dump BUGCHECK_CODE: 133 BUGCHECK_P1: 1 BUGCHECK_P2: 1e00 BUGCHECK_P3: fffff8053f171358 BUGCHECK_P4: 0 DPC_TIMEOUT_TYPE: DPC_QUEUE_EXECUTION_TIMEOUT_EXCEEDED BLACKBOXBSD: 1 (!blackboxbsd) BLACKBOXNTFS: 1 (!blackboxntfs) BLACKBOXPNP: 1 (!blackboxpnp) BLACKBOXWINLOGON: 1 CUSTOMER_CRASH_COUNT: 1 PROCESS_NAME: WeChat.exe IRP_ADDRESS: ffffffffffffff88 STACK_TEXT: fffff805`44c8ab08 fffff805`3edfa771 : 00000000`00000133 00000000`00000001 00000000`00001e00 fffff805`3f171358 : nt!KeBugCheckEx fffff805`44c8ab10 fffff805`3ec44477 : 00000751`30dd7fd8 fffff805`3ce05180 00000000`00000286 ffff8201`647a9a10 : nt!KeAccumulateTicks 0x1b80a1 fffff805`44c8ab70 fffff805`3f6b8291 : 00000000`00000000 fffff805`3f725000 ffff8201`647a9a90 fffff805`3f7250b0 : nt!KeClockInterruptNotify 0xc07 fffff805`44c8af30 fffff805`3ecf1845 : fffff805`3f725000 00000000`00000010 ffff254a`c7790c15 ffff8201`647a96e8 : hal!HalpTimerClockIpiRoutine 0x21 fffff805`44c8af60 fffff805`3edc58ca : ffff8201`647a9a90 fffff805`3f725000 ffff858c`2478b080 fffff805`3f725000 : nt!KiCallInterruptServiceRoutine 0xa5 fffff805`44c8afb0 fffff805`3edc5e37 : ffff858c`29def010 ffff8201`647a9a90 fffff805`3f725000 ffff8201`647a9cb8 : nt!KiInterruptSubDispatchNoLockNoEtw 0xfa ffff8201`647a9a10 fffff805`3ec3c742 : ffff858c`29def010 fffff805`3ee0cc1c 00000000`00000000 00000000`0014b90f : nt!KiInterruptDispatchNoLockNoEtw 0x37 ffff8201`647a9ba0 fffff805`3ee0cc1c : 00000000`00000000 00000000`0014b90f 00000000`00000001 80000001`57f16821 : nt!KeYieldProcessorEx 0x2 ffff8201`647a9bb0 fffff805`3ec5282d : 00000000`00000000 ffff858c`00000000 80000001`57f16800 ffff858c`b78f9a20 : nt!IopCompleteRequest 0x1981ec ffff8201`647a9ca0 fffff805`3edc8160 : ffffffff`ffffff00 00000000`00000000 ffff9980`00000000 fffff805`3f068200 : nt!KiDeliverApc 0x19d ffff8201`647a9d60 fffff805`3eccdac3 : 00000000`00000114 00000000`00000000 ffffdf81`dfd80000 ffffdf81`dfd80000 : nt!KiApcInterrupt 0x2f0 ffff8201`647a9ef0 fffff805`3ecdaae3 : 00000000`00000000 00000000`00000000 00000000`0000001c 00000000`00000000 : nt!MmAccessFault 0x263 ffff8201`647aa090 fffff805`3ec7d360 : ffff858c`00000000 ffff8201`00000000 ffff8201`647aa2f8 ffff8201`647aa2dc : nt!MmCheckCachedPageStates 0x1243 ffff8201`647aa290 fffff805`3ec7efc5 : ffff858c`25f909a0 00000000`1c9c3748 ffff8201`647aa470 ffff858c`00000000 : nt!CcMapAndCopyInToCache 0x770 ffff8201`647aa410 fffff805`4400bfda : 00000000`00000000 ffff858c`27b49a30 ffff858c`27b49a30 ffffb70e`2a01d170 : nt!CcCopyWriteEx 0x105 ffff8201`647aa490 fffff805`4400abf8 : ffff858c`27b499a8 00000000`00000001 ffff8201`647aa718 00000000`00000000 : Ntfs!NtfsCommonWrite 0x113a ffff8201`647aa6c0 fffff805`3ec464d9 : ffff858c`280c32c0 ffff858c`31f74010 ffff858c`31f743f8 ffff858c`1dd2dcc0 : Ntfs!NtfsFsdWrite 0x1e8 ffff8201`647aa790 fffff805`4364560e : 00000000`00000000 ffff8201`647aa870 ffff858c`31f74010 ffff8201`647aa880 : nt!IofCallDriver 0x59 ffff8201`647aa7d0 fffff805`43643f46 : ffff8201`647aa870 fffff805`43643f46 ffff8201`647aa801 00000000`00000000 : FLTMGR!FltpLegacyProcessingAfterPreCallbacksCompleted 0x15e ffff8201`647aa850 fffff805`3ec464d9 : ffff858c`31f74010 fffff805`3ec4ac45 ffff858c`32143370 00000000`00000001 : FLTMGR!FltpDispatch 0xb6 ffff8201`647aa8b0 fffff805`3f22b125 : 00000000`00000001 ffff858c`32145a80 ffff858c`31f74440 ffff858c`32145a80 : nt!IofCallDriver 0x59 ffff8201`647aa8f0 fffff805`3f1d61a6 : ffff858c`00000000 ffff858c`1dd2dcc0 ffff858c`32145a80 ffff8201`647aab80 : nt!IopSynchronousServiceTail 0x1a5 ffff8201`647aa990 fffff805`3edd5758 : ffff858c`2478b080 00000000`000019b4 00000000`00000000 00000000`1c9d120c : nt!NtWriteFile 0x676 ffff8201`647aaa90 00000000`76f61cbc : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd 0x28 00000000`18afebe8 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x76f61cbc SYMBOL_NAME: nt!KeAccumulateTicks 1b80a1 MODULE_NAME: nt IMAGE_NAME: ntkrnlmp.exe IMAGE_VERSION: 10.0.18362.1556 STACK_COMMAND: .cxr; .ecxr ; kb BUCKET_ID_FUNC_OFFSET: 1b80a1 FAILURE_BUCKET_ID: 0x133_ISR_nt!KeAccumulateTicks OSPLATFORM_TYPE: x64 OSNAME: Windows 10 FAILURE_ID_HASH: {65350307-c3b9-f4b5-8829-4d27e9ff9b06} Followup: MachineOwner --------- 麻烦帮忙看下,这个蓝屏问题要怎么解决?

你好,YiqunMao,感谢联系本站!建议卸载一下微信,正常使用1-2天,看下是否恢复正常。


点赞(51) 打赏

微信小程序

微信扫一扫体验

立即
投稿

微信公众账号

微信扫一扫加关注

发表
评论
返回
顶部