DPC_WATCHDOG_VIOLATION (133) The DPC watchdog detected a prolonged run time at an IRQL of DISPATCH_LEVEL or above. Arguments: Arg1: 0000000000000001, The system cumulatively spent an extended period of time at DISPATCH_LEVEL or above. The offending component can usually be identified with a stack trace. Arg2: 0000000000001e00, The watchdog period. Arg3: fffff804628fb320, cast to nt!DPC_WATCHDOG_GLOBAL_TRIAGE_BLOCK, which contains additional information regarding the cumulative timeout Arg4: 0000000000000000 Debugging Details: ------------------ ************************************************************************* *** *** *** *** *** Either you specified an unqualified symbol, or your debugger *** *** doesn't have full symbol information. Unqualified symbol *** *** resolution is turned off by default. Please either specify a *** *** fully qualified symbol module!symbolname, or enable resolution *** *** of unqualified symbols by typing ".symopt- 100". Note that *** *** enabling unqualified symbol resolution with network symbol *** *** server shares in the symbol path may cause the debugger to *** *** appear to hang for long periods of time when an incorrect *** *** symbol name is typed or the network symbol server is down. *** *** *** *** For some commands to work properly, your symbol path *** *** must point to .pdb files that have full type information. *** *** *** *** Certain .pdb files (such as the public OS symbols) do not *** *** contain the required information. Contact the group that *** *** provided you with these symbols if you need this command to *** *** work. *** *** *** *** Type referenced: TickPeriods *** *** *** ************************************************************************* KEY_VALUES_STRING: 1 Key : Analysis.CPU.mSec Value: 2593 Key : Analysis.DebugAnalysisManager Value: Create Key : Analysis.Elapsed.mSec Value: 4847 Key : Analysis.Init.CPU.mSec Value: 984 Key : Analysis.Init.Elapsed.mSec Value: 80543 Key : Analysis.Memory.CommitPeak.Mb Value: 98 Key : WER.OS.Branch Value: vb_release Key : WER.OS.Timestamp Value: 2019-12-06T14:06:00Z Key : WER.OS.Version Value: 10.0.19041.1 FILE_IN_CAB: MEMORY.DMP BUGCHECK_CODE: 133 BUGCHECK_P1: 1 BUGCHECK_P2: 1e00 BUGCHECK_P3: fffff804628fb320 BUGCHECK_P4: 0 DPC_TIMEOUT_TYPE: DPC_QUEUE_EXECUTION_TIMEOUT_EXCEEDED TRAP_FRAME: fffff80468291cf0 -- (.trap 0xfffff80468291cf0) NOTE: The trap frame does not contain all registers. Some register values may be zeroed or incorrect. rax=fffff80461f97900 rbx=0000000000000000 rcx=0000000000001881 rdx=0000000000001881 rsi=0000000000000000 rdi=0000000000000000 rip=fffff80461f979e9 rsp=fffff80468291e88 rbp=ffff9b82cff024e0 r8=fffff80468291f00 r9=0000000000000001 r10=fffff80461f979e0 r11=0000000000000000 r12=0000000000000000 r13=0000000000000000 r14=0000000000000000 r15=0000000000000000 iopl=0 nv up ei pl zr na po nc nt!HalpAcpiPmRegisterReadPort 0x9: fffff804`61f979e9 418800 mov byte ptr [r8],al ds:fffff804`68291f00=00 Resetting default scope BLACKBOXBSD: 1 (!blackboxbsd) BLACKBOXNTFS: 1 (!blackboxntfs) BLACKBOXPNP: 1 (!blackboxpnp) BLACKBOXWINLOGON: 1 PROCESS_NAME: DarkSoulsIII.exe STACK_TEXT: fffff804`68291b08 fffff804`6201f77e : 00000000`00000133 00000000`00000001 00000000`00001e00 fffff804`628fb320 : nt!KeBugCheckEx fffff804`68291b10 fffff804`61e16953 : 000091d2`ccd182b6 fffff804`5fabb180 00000000`00000000 fffff804`5fabb180 : nt!KeAccumulateTicks 0x2065ce fffff804`68291b70 fffff804`61e1643a : fffff804`628f3980 fffff804`68291d70 fffff804`68291b00 fffff804`7fc802a0 : nt!KeClockInterruptNotify 0x453 fffff804`68291c20 fffff804`61ede205 : fffff804`628f3980 00000000`00000000 00000000`00000000 00000000`00000000 : nt!HalpTimerClockIpiRoutine 0x1a fffff804`68291c50 fffff804`61ff8e5a : fffff804`68291d70 fffff804`628f3980 000091d2`ccd0fdba 00000000`00000000 : nt!KiCallInterruptServiceRoutine 0xa5 fffff804`68291ca0 fffff804`61ff93c7 : 00000000`00000000 00000000`00000000 00000000`00000001 00000000`00000000 : nt!KiInterruptSubDispatchNoLockNoEtw 0xfa fffff804`68291cf0 fffff804`61f979e9 : fffff804`61f96fb9 00000000`00000010 ffff9b82`cfefc000 ffff9b82`cfbdd410 : nt!KiInterruptDispatchNoLockNoEtw 0x37 fffff804`68291e88 fffff804`61f96fb9 : 00000000`00000010 ffff9b82`cfefc000 ffff9b82`cfbdd410 00000000`00000f20 : nt!HalpAcpiPmRegisterReadPort 0x9 fffff804`68291e90 fffff804`6694671a : 00000000`00000001 ffffc100`8d724280 fffff804`68291f98 00000000`00000f43 : nt!HalpAcpiPmRegisterRead 0x39 fffff804`68291ec0 fffff804`66945c94 : 00000000`00000000 ffffc100`8d724dc0 00000000`00000f43 fffff804`00400a02 : ACPI!ACPIReadGpeStatusRegister 0x66 fffff804`68291f00 fffff804`61ede205 : ffffc100`8d724dc0 ffff9b82`cf89b400 ffffc100`8d724e70 ffff3e9b`1518e439 : ACPI!ACPIInterruptServiceRoutine 0x54 fffff804`68291f40 fffff804`61ff8bdf : fffff804`6828a960 ffffc100`8d724dc0 00009181`aa203709 000091d2`ccd0fae2 : nt!KiCallInterruptServiceRoutine 0xa5 fffff804`68291f90 fffff804`61ff8ea7 : 00000000`00000000 fffff804`67015020 fffff804`66f876e0 fffff804`61ec90c6 : nt!KiInterruptSubDispatch 0x11f fffff804`6828a8e0 fffff804`61f979e9 : fffff804`61f96fb9 00000000`00000010 00000000`00000000 00009181`aa203709 : nt!KiInterruptDispatch 0x37 fffff804`6828aa78 fffff804`61f96fb9 : 00000000`00000010 00000000`00000000 00009181`aa203709 00000000`00000010 : nt!HalpAcpiPmRegisterReadPort 0x9 fffff804`6828aa80 fffff804`6694671a : 00000000`00000007 00000000`00000000 00000000`00000000 00000000`00000000 : nt!HalpAcpiPmRegisterRead 0x39 fffff804`6828aab0 fffff804`669464b4 : 00000000`80010000 fffff804`61e9b3d9 ffffc100`8d724300 fffff804`5fabe200 : ACPI!ACPIReadGpeStatusRegister 0x66 fffff804`6828aaf0 fffff804`66945c11 : 00000000`80010000 ffff9b82`cff024e0 00000000`80010000 00000000`00000004 : ACPI!ACPIInterruptDispatchEvents 0x5c fffff804`6828ab80 fffff804`61e9a3fe : fffff804`5fabe240 fffff804`6828acb0 fffff804`6828ae70 fffff804`00000002 : ACPI!ACPIInterruptServiceRoutineDPC 0xb1 fffff804`6828abb0 fffff804`61e996e4 : fffff804`5fabb180 00000000`00000000 00000000`00000002 00000000`00000004 : nt!KiExecuteAllDpcs 0x30e fffff804`6828ad20 fffff804`61ffe3f5 : 00000000`00000000 fffff804`5fabb180 ffffc100`8d724dc0 00007ff4`324ab610 : nt!KiRetireDpcList 0x1f4 fffff804`6828afb0 fffff804`61ffe1e0 : fffffe84`37c579d8 fffff804`61f25fca 00000000`00000000 ffff9b82`f6b8dc60 : nt!KxRetireDpcList 0x5 fffffe84`37c579c0 fffff804`61ffda95 : 00007ff4`324ab610 fffff804`61ff8f21 00007ff4`2f15ed98 00000000`00000000 : nt!KiDispatchInterruptContinue fffffe84`37c579f0 fffff804`61ff8f21 : 00007ff4`2f15ed98 00000000`00000000 00000000`00000000 ffffffff`feced301 : nt!KiDpcInterruptBypass 0x25 fffffe84`37c57a00 00000001`400d1eb1 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiInterruptDispatch 0xb1 00000000`0014f640 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00000001`400d1eb1 SYMBOL_NAME: ACPI!ACPIReadGpeStatusRegister 66 MODULE_NAME: ACPI IMAGE_NAME: ACPI.sys STACK_COMMAND: .cxr; .ecxr ; kb BUCKET_ID_FUNC_OFFSET: 66 FAILURE_BUCKET_ID: 0x133_ISR_ACPI!ACPIReadGpeStatusRegister OS_VERSION: 10.0.19041.1 BUILDLAB_STR: vb_release OSPLATFORM_TYPE: x64 OSNAME: Windows 10 FAILURE_ID_HASH: {9524459d-2f22-efe5-b0c9-f824c586f42c} Followup: MachineOwner ---------

HiIamDave,Iwillhelpyouwiththis.PleasechecktoseeifyourPCisproducinganyminidumpfiles,Iwillcheckthosetoseeiftheyprovideanyinsightintoapotentialcauseofthesystemcrashes.PleaseNote,IcannotdownloadfromBaiduCloudDrive,pleaseuseadifferentCloudServicefortheupload.OpenWindowsFileExplorer.NavigatetoC:\Windows\MinidumpCopyanyminidumpfilesontoyourDesktop,thenzipthoseup.UploadthezipfiletotheCloud(OneDrive,DropBox.etc.),thenchoosetosharethoseandgetasharelink.Thenpostthelinkheretothezipfile,sowecantakealookforyou.


点赞(38) 打赏

微信小程序

微信扫一扫体验

立即
投稿

微信公众账号

微信扫一扫加关注

发表
评论
返回
顶部