Microsoft (R) Windows Debugger Version 10.0.25200.1003 AMD64 Copyright (c) Microsoft Corporation. All rights reserved. Loading Dump File [F:\110922-6781-01.dmp] Mini Kernel Dump File: Only registers and stack trace are available Symbol search path is: srv* Executable search path is: Windows 10 Kernel Version 22000 MP (12 procs) Free x64 Product: WinNt, suite: TerminalServer SingleUserTS Personal Machine Name: Kernel base = 0xfffff805`20400000 PsLoadedModuleList = 0xfffff805`21029a40 Debug session time: Wed Nov 9 23:31:17.670 2022 (UTC 8:00) System Uptime: 0 days 0:50:01.500 Loading Kernel Symbols .. Press ctrl-c (cdb, kd, ntsd) or ctrl-break (windbg) to abort symbol loads that take too long. Run !sym noisy before .reload to track down problems loading symbols. ............................................................. ................................................................ ................................................................ ....................... Loading User Symbols Loading unloaded module list .................................................. For analysis of this file, run !analyze -v nt!KeBugCheckEx: fffff805`2081af80 48894c2408 mov qword ptr [rsp 8],rcx ss:0018:ffffae80`7af7ade0=0000000000000133 11: kd> !analyze -v ******************************************************************************* * * * Bugcheck Analysis * * * ******************************************************************************* DPC_WATCHDOG_VIOLATION (133) The DPC watchdog detected a prolonged run time at an IRQL of DISPATCH_LEVEL or above. Arguments: Arg1: 0000000000000001, The system cumulatively spent an extended period of time at DISPATCH_LEVEL or above. Arg2: 0000000000001e00, The watchdog period (in ticks). Arg3: fffff80521105330, cast to nt!DPC_WATCHDOG_GLOBAL_TRIAGE_BLOCK, which contains additional information regarding the cumulative timeout Arg4: 0000000000000000 Debugging Details: ------------------ ************************************************************************* *** *** *** *** *** Either you specified an unqualified symbol, or your debugger *** *** doesn't have full symbol information. Unqualified symbol *** *** resolution is turned off by default. Please either specify a *** *** fully qualified symbol module!symbolname, or enable resolution *** *** of unqualified symbols by typing ".symopt- 100". Note that *** *** enabling unqualified symbol resolution with network symbol *** *** server shares in the symbol path may cause the debugger to *** *** appear to hang for long periods of time when an incorrect *** *** symbol name is typed or the network symbol server is down. *** *** *** *** For some commands to work properly, your symbol path *** *** must point to .pdb files that have full type information. *** *** *** *** Certain .pdb files (such as the public OS symbols) do not *** *** contain the required information. Contact the group that *** *** provided you with these symbols if you need this command to *** *** work. *** *** *** *** Type referenced: TickPeriods *** *** *** ************************************************************************* KEY_VALUES_STRING: 1 Key : Analysis.CPU.mSec Value: 1687 Key : Analysis.DebugAnalysisManager Value: Create Key : Analysis.Elapsed.mSec Value: 10282 Key : Analysis.IO.Other.Mb Value: 6 Key : Analysis.IO.Read.Mb Value: 0 Key : Analysis.IO.Write.Mb Value: 18 Key : Analysis.Init.CPU.mSec Value: 577 Key : Analysis.Init.Elapsed.mSec Value: 264794 Key : Analysis.Memory.CommitPeak.Mb Value: 97 Key : Bugcheck.Code.DumpHeader Value: 0x133 Key : Bugcheck.Code.Register Value: 0x133 Key : Dump.Attributes.AsUlong Value: 1008 Key : Dump.Attributes.DiagDataWrittenToHeader Value: 1 Key : Dump.Attributes.ErrorCode Value: 0 Key : Dump.Attributes.KernelGeneratedTriageDump Value: 1 Key : Dump.Attributes.LastLine Value: Dump completed successfully. Key : Dump.Attributes.ProgressPercentage Value: 0 FILE_IN_CAB: 110922-6781-01.dmp DUMP_FILE_ATTRIBUTES: 0x1008 Kernel Generated Triage Dump BUGCHECK_CODE: 133 BUGCHECK_P1: 1 BUGCHECK_P2: 1e00 BUGCHECK_P3: fffff80521105330 BUGCHECK_P4: 0 DPC_TIMEOUT_TYPE: DPC_QUEUE_EXECUTION_TIMEOUT_EXCEEDED BLACKBOXBSD: 1 (!blackboxbsd) BLACKBOXNTFS: 1 (!blackboxntfs) BLACKBOXPNP: 1 (!blackboxpnp) BLACKBOXWINLOGON: 1 CUSTOMER_CRASH_COUNT: 1 PROCESS_NAME: MsMpEng.exe STACK_TEXT: ffffae80`7af7add8 fffff805`2063188f : 00000000`00000133 00000000`00000001 00000000`00001e00 fffff805`21105330 : nt!KeBugCheckEx ffffae80`7af7ade0 fffff805`206314a1 : 00000718`efdd501c ffffae80`7af0f180 00000000`00000246 fffff805`2062cc2e : nt!KeAccumulateTicks 0x20f ffffae80`7af7ae50 fffff805`2062f68a : ffffae80`7af18200 fffff585`c7a86ef0 ffffae80`7af18338 fffff805`2071ed8b : nt!KiUpdateRunTime 0x61 ffffae80`7af7aeb0 fffff805`2062f476 : ffff8488`3bd38040 ffff8488`3bd380f0 00007b77`00000000 00000000`00000000 : nt!KeClockInterruptNotify 0x11a ffffae80`7af7af40 fffff805`20614600 : ffff8488`3bd38040 fffff805`20675bdc 00007b77`00000000 00000000`00000000 : nt!HalpTimerClockIpiRoutine 0x16 ffffae80`7af7af70 fffff805`2081d0ca : fffff585`c7a86f70 ffff8488`3bd38040 00000000`00000000 00007b77`aad682d8 : nt!KiCallInterruptServiceRoutine 0xa0 ffffae80`7af7afb0 fffff805`2081d937 : 00000000`c3ca8323 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiInterruptSubDispatchNoLockNoEtw 0xfa fffff585`c7a86ef0 fffff805`206b43ac : ffff8488`4fc2b4b0 00000000`00000000 00000000`00000210 00000000`0000082f : nt!KiInterruptDispatchNoLockNoEtw 0x37 fffff585`c7a87080 fffff805`206b4371 : fffff805`2104d018 ffffae80`7af0f180 00000000`00000000 00000000`00000000 : nt!KxWaitForSpinLockAndAcquire 0x2c fffff585`c7a870b0 fffff805`20923199 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KeAcquireSpinLockRaiseToDpc 0xc1 fffff585`c7a870e0 fffff805`20ce0ae2 : 00000000`00000008 00000000`00000000 00000000`00544454 fffff585`c7a87160 : nt!HalpRegisterProfileSourceInterruptHandler 0x19 fffff585`c7a87110 fffff805`8ecbd332 : 00000000`00000000 ffff8488`4fc2b4a0 00000000`00000000 fffff805`8ecc0eb0 : nt!HalpSetSystemInformation 0xf3392 fffff585`c7a87140 00000000`00000000 : ffff8488`4fc2b4a0 00000000`00000000 fffff805`8ecc0eb0 fffff805`8ecd7350 : MpKslDrv 0xd332 SYMBOL_NAME: MpKslDrv d332 MODULE_NAME: MpKslDrv IMAGE_NAME: MpKslDrv.sys STACK_COMMAND: .cxr; .ecxr ; kb BUCKET_ID_FUNC_OFFSET: d332 FAILURE_BUCKET_ID: 0x133_ISR_MpKslDrv!unknown_function OSPLATFORM_TYPE: x64 OSNAME: Windows 10 FAILURE_ID_HASH: {52e8c45a-d9a8-23a2-b31a-72f3be5145fc} Followup: MachineOwner --------- 11: kd> lmvm MpKslDrv Browse full module list start end module name fffff805`8ecb0000 fffff805`8ecec000 MpKslDrv T (no symbols) Loaded symbol image file: MpKslDrv.sys Image path: MpKslDrv.sys Image name: MpKslDrv.sys Browse all global symbols functions data Timestamp: ***** Invalid (FEBC08CC) CheckSum: 00038378 ImageSize: 0003C000 Translations: 0000.04b0 0000.04e4 0409.04b0 0409.04e4 Information from resource tables:

恐怕我无法访问提供的链接。请分享给www.wetransfer.com只分享链接,不用发到邮箱。谢谢


HiTechi,I'mDyari.Thanksforreachingout.Iwillbehappytoassistyouinthisregard.KindlycheckC:\Windows\MinidumpandcopyavailableminidumpfilestothedesktopthensharethemviaOneDriveorGoogleDriveinordertobeanalyzedandindicatewhichfileiscausingthecrash.Regards,嗨,技术,迪亚里。感谢您伸出援手。我很乐意在这方面为您提供帮助。请检查C:\Windows\Minidump并将可用的minidump文件复制到桌面,然后通过OneDriveGoogleDrive共享它们,以便分析并指出导致崩溃的文件。问候,


百度网盘链接:https://pan.baidu.com/s/1N7eyn4q-Wg0KCBF4rZu92g?pwd=6522提取码:6522复制这段内容后打开百度网盘手机App,操作更方便哦此是否有帮助?是否抱歉,这没有帮助。太棒了!感谢你的反馈。你对此的满意度如何?感谢你的反馈,它能帮助改进网站。你对此的满意度如何?感谢你的反馈。


恐怕我无法访问提供的链接。请分享给www.wetransfer.com只分享链接,不用发到邮箱。谢谢


https://we.tl/t-6UH29BswpC这是新的此是否有帮助?是否抱歉,这没有帮助。太棒了!感谢你的反馈。你对此的满意度如何?感谢你的反馈,它能帮助改进网站。你对此的满意度如何?感谢你的反馈。


点赞(37) 打赏

微信小程序

微信扫一扫体验

立即
投稿

微信公众账号

微信扫一扫加关注

发表
评论
返回
顶部