这是dump包分析出的东西 Microsoft (R) Windows Debugger Version 10.0.22549.1000 AMD64 Copyright (c) Microsoft Corporation. All rights reserved. Loading Dump File [C:\Windows\Minidump\032322-8359-01.dmp] Mini Kernel Dump File: Only registers and stack trace are available ************* Path validation summary ************** Response Time (ms) Location Deferred srv* Symbol search path is: srv* Executable search path is: Windows 10 Kernel Version 19041 MP (16 procs) Free x64 Product: WinNt, suite: TerminalServer SingleUserTS Personal Machine Name: Kernel base = 0xfffff800`40c00000 PsLoadedModuleList = 0xfffff800`4182a2d0 Debug session time: Wed Mar 23 16:44:52.120 2022 (UTC 8:00) System Uptime: 0 days 1:14:21.797 Loading Kernel Symbols .. Press ctrl-c (cdb, kd, ntsd) or ctrl-break (windbg) to abort symbol loads that take too long. Run !sym noisy before .reload to track down problems loading symbols. ............................................................. ................................................................ ................................................................ ..................... Loading User Symbols Loading unloaded module list .................................................. For analysis of this file, run !analyze -v nt!KeBugCheckEx: fffff800`40ff78a0 48894c2408 mov qword ptr [rsp 8],rcx ss:0018:ffffbd80`62fe1e20=0000000000000133 2: kd> !analyze -v ******************************************************************************* * * * Bugcheck Analysis * * * ******************************************************************************* DPC_WATCHDOG_VIOLATION (133) The DPC watchdog detected a prolonged run time at an IRQL of DISPATCH_LEVEL or above. Arguments: Arg1: 0000000000000000, A single DPC or ISR exceeded its time allotment. The offending component can usually be identified with a stack trace. Arg2: 0000000000000501, The DPC time count (in ticks). Arg3: 0000000000000500, The DPC time allotment (in ticks). Arg4: fffff800418fb320, cast to nt!DPC_WATCHDOG_GLOBAL_TRIAGE_BLOCK, which contains additional information regarding this single DPC timeout Debugging Details: ------------------ ************************************************************************* *** *** *** *** *** Either you specified an unqualified symbol, or your debugger *** *** doesn't have full symbol information. Unqualified symbol *** *** resolution is turned off by default. Please either specify a *** *** fully qualified symbol module!symbolname, or enable resolution *** *** of unqualified symbols by typing ".symopt- 100". Note that *** *** enabling unqualified symbol resolution with network symbol *** *** server shares in the symbol path may cause the debugger to *** *** appear to hang for long periods of time when an incorrect *** *** symbol name is typed or the network symbol server is down. *** *** *** *** For some commands to work properly, your symbol path *** *** must point to .pdb files that have full type information. *** *** *** *** Certain .pdb files (such as the public OS symbols) do not *** *** contain the required information. Contact the group that *** *** provided you with these symbols if you need this command to *** *** work. *** *** *** *** Type referenced: TickPeriods *** *** *** ************************************************************************* KEY_VALUES_STRING: 1 Key : Analysis.CPU.mSec Value: 3593 Key : Analysis.DebugAnalysisManager Value: Create Key : Analysis.Elapsed.mSec Value: 12041 Key : Analysis.Init.CPU.mSec Value: 468 Key : Analysis.Init.Elapsed.mSec Value: 40382 Key : Analysis.Memory.CommitPeak.Mb Value: 94 FILE_IN_CAB: 032322-8359-01.dmp DUMP_FILE_ATTRIBUTES: 0x8 Kernel Generated Triage Dump BUGCHECK_CODE: 133 BUGCHECK_P1: 0 BUGCHECK_P2: 501 BUGCHECK_P3: 500 BUGCHECK_P4: fffff800418fb320 DPC_TIMEOUT_TYPE: SINGLE_DPC_TIMEOUT_EXCEEDED BLACKBOXBSD: 1 (!blackboxbsd) BLACKBOXNTFS: 1 (!blackboxntfs) BLACKBOXPNP: 1 (!blackboxpnp) BLACKBOXWINLOGON: 1 CUSTOMER_CRASH_COUNT: 1 PROCESS_NAME: System STACK_TEXT: ffffbd80`62fe1e18 fffff800`4101fbfa : 00000000`00000133 00000000`00000000 00000000`00000501 00000000`00000500 : nt!KeBugCheckEx ffffbd80`62fe1e20 fffff800`40e16953 : 00000cfa`6457fd1f ffffbd80`62fc8180 00000000`00000000 ffffbd80`62fc8180 : nt!KeAccumulateTicks 0x206a4a ffffbd80`62fe1e80 fffff800`40e1643a : ffff888c`28ae80e0 ffffdf02`7d63f690 fffff800`455ffd00 00000002`00008101 : nt!KeClockInterruptNotify 0x453 ffffbd80`62fe1f30 fffff800`40ede215 : ffff888c`28ae80e0 00000000`00000000 00000000`00000000 ffff9567`36f422ff : nt!HalpTimerClockIpiRoutine 0x1a ffffbd80`62fe1f60 fffff800`40ff934a : ffffdf02`7d63f690 ffff888c`28ae80e0 00000ceb`841c325f 00000000`00000000 : nt!KiCallInterruptServiceRoutine 0xa5 ffffbd80`62fe1fb0 fffff800`40ff98b7 : ffffdf02`00000000 00001f80`00ff02c4 00000000`423ba498 ffffdf02`7d63f7e0 : nt!KiInterruptSubDispatchNoLockNoEtw 0xfa ffffdf02`7d63f610 fffff800`40e80c7b : ffffdf02`7d63f800 fffff800`415ab4e9 ffff888c`3226e318 ffffbd80`62fc8180 : nt!KiInterruptDispatchNoLockNoEtw 0x37 ffffdf02`7d63f7a0 fffff800`415ab4e9 : ffff888c`3226e318 ffffbd80`62fc8180 ffff888c`3226e660 ffffdf02`7d63faf4 : nt!KeYieldProcessorEx 0x1b ffffdf02`7d63f7b0 fffff800`415a9dc5 : ffffdf02`423c8137 ffffbd80`62fc8180 ffff888c`3b725cc0 00000000`00000000 : nt!IopLiveDumpProcessCorralStateChange 0x2d ffffdf02`7d63f7e0 fffff800`40e9a40e : ffffbd80`62fcb240 ffff888c`28dd2000 ffffdf02`7d630400 ffffbd80`00000002 : nt!IopLiveDumpCorralDpc 0x55 ffffdf02`7d63f820 fffff800`40e996f4 : 00000000`00000000 fffff800`40eedd15 00000000`00140001 00000000`00000000 : nt!KiExecuteAllDpcs 0x30e ffffdf02`7d63f990 fffff800`40ffb40e : ffffffff`00000000 ffffbd80`62fc8180 00000000`00000000 ffffbd80`62fd3440 : nt!KiRetireDpcList 0x1f4 ffffdf02`7d63fc20 00000000`00000000 : ffffdf02`7d640000 ffffdf02`7d639000 00000000`00000000 00000000`00000000 : nt!KiIdleLoop 0x9e SYMBOL_NAME: nt!KeAccumulateTicks 206a4a MODULE_NAME: nt IMAGE_NAME: ntkrnlmp.exe IMAGE_VERSION: 10.0.19041.1620 STACK_COMMAND: .cxr; .ecxr ; kb BUCKET_ID_FUNC_OFFSET: 206a4a FAILURE_BUCKET_ID: 0x133_DPC_nt!KeAccumulateTicks OSPLATFORM_TYPE: x64 OSNAME: Windows 10 FAILURE_ID_HASH: {88dc98ce-f842-4daa-98d0-858621db6b0f} Followup: MachineOwner --------- 2: kd> lmvm nt Browse full module list start             end                 module name fffff800`40c00000 fffff800`41c46000   nt         (pdb symbols)          C:\ProgramData\Dbg\sym\ntkrnlmp.pdb\F7CAAA94CB0E01AE142BBD2FC8634CD41\ntkrnlmp.pdb     Loaded symbol image file: ntkrnlmp.exe     Mapped memory image file: C:\ProgramData\Dbg\sym\ntkrnlmp.exe\1DBB86C21046000\ntkrnlmp.exe     Image path: ntkrnlmp.exe     Image name: ntkrnlmp.exe     Browse all global symbols  functions  data     Image was built with /Brepro flag.     Timestamp:        1DBB86C2 (This is a reproducible build file hash, not a timestamp)     CheckSum:         00A640E9     ImageSize:        01046000     File version:     10.0.19041.1620     Product version:  10.0.19041.1620     File flags:       0 (Mask 3F)     File OS:          40004 NT Win32     File type:        1.0 App     File date:        00000000.00000000     Translations:     0409.04b0     Information from resource tables:         CompanyName:      Microsoft Corporation         ProductName:      Microsoft® Windows® Operating System         InternalName:     ntkrnlmp.exe         OriginalFilename: ntkrnlmp.exe         ProductVersion:   10.0.19041.1620         FileVersion:      10.0.19041.1620 (WinBuild.160101.0800)         FileDescription:  NT Kernel & System         LegalCopyright:   © Microsoft Corporation. All rights reserved.

欢迎咨询本站!Chen。若是有超频,建议恢复正常,包括主板自动超频功能。然后到设备供应商的官网更新一下bios,覆盖安装一下显卡驱动,网卡驱动,芯片组驱动,电源相关的驱动,请勿使用第三方的驱动安装程序。完成后执行一下干净启动,排除其他干扰:https://support.microsoft.com/zh-cn/help/929135.先卸载设备中全部的第三方反病毒软件与系统优化软件(例如360、360桌面、腾讯电脑管家、腾讯桌面、鲁大师,代理,加速器,虚拟机等)。然后鼠标右键单击开始菜单→运行(RUN)→输入:msconfig(按下Enter键)点击上面的“服务”勾选下面的“隐藏所有Microsoft服务”(请务必勾选)点击“全部禁用”。然后鼠标右键单击开始菜单→任务管理器,(点击底部“详细信息”),点击顶部”启动”,鼠标右键单击“状态”显示为“已启动”的项,选择“禁用”。(禁用所有启动项。)然后重启电脑(不是关机再开机,得选择“重启”)。


点赞(25) 打赏

微信小程序

微信扫一扫体验

立即
投稿

微信公众账号

微信扫一扫加关注

发表
评论
返回
顶部